Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-27765 | The system exposes several endpoints, typically including "/int/" in their path, that should be restricted to internal services, but are instead publicly accessible without authentication to any host able to reach the application server on port 443/tcp. |
| Link | Providers |
|---|---|
| https://cert.pl/en/posts/2025/08/CVE-2025-2313/ |
|
Wed, 27 Aug 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cgm
Cgm clininet |
|
| Vendors & Products |
Cgm
Cgm clininet |
Wed, 27 Aug 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 27 Aug 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The system exposes several endpoints, typically including "/int/" in their path, that should be restricted to internal services, but are instead publicly accessible without authentication to any host able to reach the application server on port 443/tcp. | |
| Title | Missing authentication in APIs allowing data retrieval and modification | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2025-08-27T16:12:54.068Z
Reserved: 2025-03-14T14:54:23.998Z
Link: CVE-2025-30037
Updated: 2025-08-27T16:12:32.431Z
Status : Deferred
Published: 2025-08-27T11:15:32.927
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-30037
No data.
OpenCVE Enrichment
Updated: 2025-08-27T21:57:40Z
EUVD