Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 11 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aptsys gemscms Backend
|
|
| CPEs | cpe:2.3:a:aptsys:gemscms_backend:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Aptsys gemscms Backend
|
Mon, 26 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 26 Jan 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-209 | |
| Metrics |
cvssV3_1
|
Mon, 26 Jan 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aptsys
Aptsys gemsloyalty |
|
| Vendors & Products |
Aptsys
Aptsys gemsloyalty |
Fri, 23 Jan 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in the PHP backend of gemsloyalty.aptsys.com.sg thru 2025-05-28 allows unauthenticated remote attackers to trigger detailed error messages that disclose internal file paths, code snippets, and stack traces. This occurs when specially crafted HTTP GET/POST requests are sent to public API endpoints, exposing potentially sensitive information useful for further exploitation. This issue is classified under CWE-209: Information Exposure Through an Error Message. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-26T16:57:07.721Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-52022
Updated: 2026-01-26T16:56:23.171Z
Status : Analyzed
Published: 2026-01-23T21:15:49.673
Modified: 2026-02-11T19:25:31.770
Link: CVE-2025-52022
No data.
OpenCVE Enrichment
Updated: 2026-01-26T11:54:20Z