Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 30 Dec 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Henzljw
Henzljw hashtech |
|
| CPEs | cpe:2.3:a:henzljw:hashtech:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Henzljw
Henzljw hashtech |
Mon, 01 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 | |
| Metrics |
cvssV3_1
|
Mon, 01 Dec 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hashtech Project
Hashtech Project hashtech |
|
| Vendors & Products |
Hashtech Project
Hashtech Project hashtech |
Wed, 26 Nov 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthenticated administrative access vulnerability exists in the open-source HashTech project (https://github.com/henzljw/hashtech) 1.0 thru commit 5919decaff2681dc250e934814fc3a35f6093ee5 (2021-07-02). Due to missing authentication checks on /admin_index.php, an attacker can directly access the admin dashboard without valid credentials. This allows full administrative control including viewing/modifying user accounts, managing orders, changing payments, and editing product listings. Successful exploitation can lead to information disclosure, data manipulation, and privilege escalation. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-01T19:15:42.318Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65276
Updated: 2025-12-01T18:54:31.523Z
Status : Analyzed
Published: 2025-11-26T20:15:49.660
Modified: 2025-12-30T15:34:16.817
Link: CVE-2025-65276
No data.
OpenCVE Enrichment
Updated: 2025-12-01T15:19:31Z