Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-22955 | An API endpoint that should be limited to web application administrators is hidden from, but accessible by, lower-level read only web application users. The endpoint can be used to export the appliance configuration, exposing sensitive information. |
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 09 Oct 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xorux xormon
|
|
| CPEs | cpe:2.3:a:xorux:xormon:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Xorux xormon
|
Tue, 29 Jul 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 29 Jul 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xorux
Xorux xormon-ng |
|
| Vendors & Products |
Xorux
Xorux xormon-ng |
Mon, 28 Jul 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An API endpoint that should be limited to web application administrators is hidden from, but accessible by, lower-level read only web application users. The endpoint can be used to export the appliance configuration, exposing sensitive information. | |
| Title | KL-001-2025-012: Xorux XorMon-NG Read Only User Export Device Configuration Exposing Sensitive Information | |
| Weaknesses | CWE-648 | |
| References |
|
Status: PUBLISHED
Assigner: KoreLogic
Published:
Updated: 2025-11-03T20:06:33.686Z
Reserved: 2025-07-28T16:02:18.186Z
Link: CVE-2025-54766
Updated: 2025-11-03T20:06:33.686Z
Status : Modified
Published: 2025-07-29T00:15:24.073
Modified: 2025-11-03T20:19:14.670
Link: CVE-2025-54766
No data.
OpenCVE Enrichment
Updated: 2025-07-29T10:00:55Z
EUVD