Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-22957 | An API endpoint that should be limited to web application administrators is hidden from, but accessible by, lower-level read only web application users. The endpoint can be used to download logs from the appliance configuration, exposing sensitive information. |
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 09 Oct 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:xorux:lpar2rrd:*:*:*:*:*:*:*:* |
Wed, 30 Jul 2025 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xorux
Xorux lpar2rrd |
|
| Vendors & Products |
Xorux
Xorux lpar2rrd |
Tue, 29 Jul 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 28 Jul 2025 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An API endpoint that should be limited to web application administrators is hidden from, but accessible by, lower-level read only web application users. The endpoint can be used to download logs from the appliance configuration, exposing sensitive information. | |
| Title | KL-001-2025-015: Xorux LPAR2RRD Read Only User Log Download Exposing Sensitive Information | |
| Weaknesses | CWE-648 | |
| References |
|
Status: PUBLISHED
Assigner: KoreLogic
Published:
Updated: 2025-11-03T20:06:36.441Z
Reserved: 2025-07-28T16:02:18.186Z
Link: CVE-2025-54768
Updated: 2025-11-03T20:06:36.441Z
Status : Modified
Published: 2025-07-29T00:15:24.350
Modified: 2025-11-03T20:19:14.927
Link: CVE-2025-54768
No data.
OpenCVE Enrichment
Updated: 2025-07-30T06:15:19Z
EUVD