• Cybersecurity Vulnerabilities

    CVE-2025-65278: GroceryMart Leaks Plaintext User Credentials!

    Overview CVE-2025-65278 is a critical security vulnerability discovered in GroceryMart, specifically affecting the users.json file within commit 21934e6 (dated 2020-10-23). This flaw allows unauthenticated attackers to access sensitive information, including plaintext usernames and passwords, potentially leading to significant security breaches. Technical Details The vulnerability resides in the users.json file of the specified GroceryMart commit. This file contains user account information, which, unfortunately, is stored in plaintext. An attacker who can access this file (e.g., through a misconfigured web server, exposed directory listing, or other means) can retrieve usernames and passwords without any authentication. The vulnerable commit, 21934e6, highlights the need…

  • Cybersecurity Vulnerabilities

    Urgent: Unauthenticated Admin Access Vulnerability Threatens HashTech Project (CVE-2025-65276)

    Overview A critical security vulnerability, identified as CVE-2025-65276, has been discovered in the open-source HashTech project (version 1.0 up to commit 5919decaff2681dc250e934814fc3a35f6093ee5, dated 2021-07-02). This flaw allows unauthenticated attackers to gain full administrative access to the HashTech dashboard. This severe issue stems from a lack of proper authentication checks on the /admin_index.php endpoint. Technical Details The root cause of CVE-2025-65276 lies in the absence of authentication mechanisms protecting the /admin_index.php page. This allows any unauthorized user to bypass login procedures and directly access the administrative interface. Specifically, the application fails to verify user credentials before granting access to sensitive administrative…

  • Cybersecurity Vulnerabilities

    CVE-2025-50433: Critical Account Takeover Vulnerability in imonnit.com

    Overview CVE-2025-50433 describes a critical vulnerability discovered in imonnit.com on April 24, 2025. This vulnerability allows malicious actors to gain escalated privileges and take over arbitrary user accounts through a crafted password reset exploit. Successful exploitation of this flaw could lead to unauthorized access to sensitive data, system compromise, and significant disruption of services. This vulnerability was published on November 26, 2025, and while the CVSS score and severity are currently listed as N/A, the potential impact warrants immediate attention. Technical Details The vulnerability stems from an insecure password reset mechanism. By manipulating parameters within the password reset process, an…

  • Cybersecurity Vulnerabilities

    CVE-2025-13611: GitLab Token Exposure via Logs – Low Severity

    Overview CVE-2025-13611 describes a low-severity vulnerability affecting GitLab Community Edition (CE) and Enterprise Edition (EE). This issue, remediated by GitLab, could potentially allow an authenticated user with access to specific logs to obtain sensitive tokens under certain conditions. This vulnerability impacts GitLab versions from 13.2 before 18.4.5, 18.5 before 18.5.3, and 18.6 before 18.6.1. Technical Details The vulnerability stems from insufficient sanitization of sensitive data within GitLab logs. While the exact conditions required for token exposure are not explicitly detailed, the vulnerability description suggests that an authenticated user with appropriate log access privileges could potentially extract tokens. The core issue…

  • Cybersecurity Vulnerabilities

    CVE-2025-12653: GitLab Vulnerability Allows Unauthorized Organization Access

    Overview CVE-2025-12653 describes a security vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE) that could allow an unauthenticated user to join arbitrary organizations. This vulnerability affects versions 18.3 before 18.4.5, 18.5 before 18.5.3, and 18.6 before 18.6.1. By manipulating request headers under specific conditions, an attacker could bypass authentication checks and gain unauthorized access to an organization within GitLab. Technical Details The vulnerability stems from insufficient validation of request headers during the organization join process. An unauthenticated user could potentially modify certain headers in a crafted request to impersonate an authorized user or bypass authorization checks altogether. The…

  • Cybersecurity Vulnerabilities

    CVE-2025-12571: Critical GitLab DoS Vulnerability Requires Immediate Patching

    Overview CVE-2025-12571 is a high-severity Denial of Service (DoS) vulnerability affecting GitLab CE/EE. This flaw allows an unauthenticated attacker to disrupt GitLab service availability by sending specifically crafted requests containing malicious JSON payloads. Successful exploitation can render the GitLab instance unusable, impacting development workflows and potentially causing data loss or corruption if not addressed promptly. This vulnerability affects GitLab versions from 17.10 before 18.4.5, 18.5 before 18.5.3, and 18.6 before 18.6.1. Users running these versions are strongly advised to upgrade to a patched version as soon as possible. Technical Details The vulnerability lies in how GitLab processes incoming JSON requests.…

  • Cybersecurity Vulnerabilities

    OneUptime Under Attack: CVE-2025-66028 Exposes Privilege Escalation Risk

    Overview CVE-2025-66028 describes a privilege escalation vulnerability affecting OneUptime, a solution designed for monitoring and managing online services. This vulnerability allows an attacker to potentially gain unauthorized access to the admin dashboard by manipulating the login response. Technical Details The vulnerability lies in the login process of OneUptime versions prior to 8.0.5567. The server response included a parameter called isMasterAdmin. An attacker could intercept the login response and modify the value of this parameter from false to true. By doing so, they could gain access to the admin dashboard interface. It is important to note, however, that even with access…

  • Cybersecurity Vulnerabilities

    OneUptime Account Creation Vulnerability: Understanding and Mitigating CVE-2025-65966

    Overview CVE-2025-65966 describes a vulnerability in OneUptime version 9.0.5598, a solution designed for monitoring and managing online services. This vulnerability allows users with low privileges to bypass the intended account creation interface and directly create new accounts via API requests. This could potentially lead to unauthorized access and resource manipulation. Technical Details In OneUptime version 9.0.5598, the account creation process implemented insufficient access control checks on the API endpoint responsible for creating new accounts. A low-permission user, by crafting a specific API request, could successfully create new user accounts without proper authorization. This circumvents the intended account creation workflow, which…

  • Cybersecurity Vulnerabilities

    CVE-2025-65681: Critical Data Exposure Vulnerability in Overhang.IO (tutor-open-edx)

    Overview CVE-2025-65681 describes a sensitive data exposure vulnerability found in Overhang.IO (tutor-open-edx), specifically version 20.0.2. This vulnerability allows local unauthorized attackers to potentially access sensitive information due to the absence of proper cache-control HTTP headers and inadequate client-side session checks. Exploitation could lead to the leakage of user data, configuration details, or other confidential information. Technical Details The root cause of this vulnerability lies in the failure to implement proper cache-control HTTP headers. Without these headers, sensitive data may be cached by the browser or intermediate proxies, making it accessible to unauthorized users with local access to the system. Additionally,…

  • Cybersecurity Vulnerabilities

    Classroomio LMS Hacked! Stored XSS Vulnerability Exposes Educational Platforms (CVE-2025-65676)

    Overview A stored Cross-Site Scripting (XSS) vulnerability has been identified in Classroomio LMS version 0.1.13. This vulnerability, tracked as CVE-2025-65676, allows authenticated attackers to inject arbitrary web scripts that execute in other users’ browsers. The vulnerability stems from insufficient sanitization of user-supplied input in SVG cover images. Technical Details The vulnerability lies in the way Classroomio LMS handles SVG files uploaded as cover images. An attacker can craft a malicious SVG file containing embedded JavaScript code. When a user views a page that displays this image (e.g., a course page, profile page), the embedded JavaScript will execute within their browser…