Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 11 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aptsys gemscms Backend
|
|
| CPEs | cpe:2.3:a:aptsys:gemscms_backend:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Aptsys gemscms Backend
|
Mon, 26 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 26 Jan 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-209 | |
| Metrics |
cvssV3_1
|
Mon, 26 Jan 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aptsys
Aptsys gemscms |
|
| Vendors & Products |
Aptsys
Aptsys gemscms |
Fri, 23 Jan 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in the PHP backend of gemscms.aptsys.com.sg thru 2025-05-28 allows unauthenticated remote attackers to trigger detailed error messages that disclose internal file paths, code snippets, and stack traces. This occurs when specially crafted HTTP GET/POST requests are sent to public API endpoints, exposing potentially sensitive information useful for further exploitation. This issue is classified under CWE-209: Information Exposure Through an Error Message. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-26T16:51:05.996Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-52023
Updated: 2026-01-26T16:50:15.643Z
Status : Analyzed
Published: 2026-01-23T21:15:50.507
Modified: 2026-02-11T19:24:45.643
Link: CVE-2025-52023
No data.
OpenCVE Enrichment
Updated: 2026-01-26T11:54:20Z