Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-27610 | WebSocket endpoint `/api/v2/ws/logs` reachable without authentication even when --auth is enabled |
Github GHSA |
GHSA-jxmr-2h4q-rhxp | WebSocket endpoint `/api/v2/ws/logs` reachable without authentication even when --auth is enabled |
Wed, 24 Sep 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hoverfly
Hoverfly hoverfly |
|
| Weaknesses | CWE-532 | |
| CPEs | cpe:2.3:a:hoverfly:hoverfly:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Hoverfly
Hoverfly hoverfly |
|
| Metrics |
cvssV3_1
|
Thu, 11 Sep 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Spectolabs
Spectolabs hoverfly |
|
| Vendors & Products |
Spectolabs
Spectolabs hoverfly |
Wed, 10 Sep 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 10 Sep 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Hoverfly is an open source API simulation tool. In versions 1.11.3 and prior, Hoverfly’s admin WebSocket endpoint /api/v2/ws/logs is not protected by the same authentication middleware that guards the REST admin API. Consequently, an unauthenticated remote attacker can stream real-time application logs (information disclosure) and/or gain insight into internal file paths, request/response bodies, and other potentially sensitive data emitted in logs. Version 1.12.0 contains a fix for the issue. | |
| Title | Hoverfly's WebSocket endpoint `/api/v2/ws/logs` reachable without authentication even when --auth is enabled. | |
| Weaknesses | CWE-200 CWE-287 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-10T20:05:22.071Z
Reserved: 2025-07-21T16:12:20.733Z
Link: CVE-2025-54376
Updated: 2025-09-10T20:05:00.125Z
Status : Analyzed
Published: 2025-09-10T20:15:35.077
Modified: 2026-04-29T01:00:01.613
Link: CVE-2025-54376
No data.
OpenCVE Enrichment
Updated: 2025-09-11T10:42:38Z
EUVD
Github GHSA