Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 30 Jan 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Webpros
Webpros plesk Obsidian |
|
| CPEs | cpe:2.3:a:webpros:plesk_obsidian:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Webpros
Webpros plesk Obsidian |
Sat, 10 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | plesk: Plesk Obsidian: Denial of Service via crafted request to get_password.php | |
| Weaknesses | CWE-606 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 09 Jan 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Plesk
Plesk obsidian |
|
| Vendors & Products |
Plesk
Plesk obsidian |
Thu, 08 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-400 | |
| Metrics |
cvssV3_1
|
Thu, 08 Jan 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Plesk Obsidian versions 8.0.1 through 18.0.73 are vulnerable to a Denial of Service (DoS) condition. The vulnerability exists in the get_password.php endpoint, where a crafted request containing a malicious payload can cause the affected web interface to continuously reload, rendering the service unavailable to legitimate users. An attacker can exploit this issue remotely without authentication, resulting in a persistent availability impact on the affected Plesk Obsidian instance. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-08T19:05:27.934Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65518
Updated: 2026-01-08T19:04:47.204Z
Status : Analyzed
Published: 2026-01-08T19:15:57.043
Modified: 2026-01-30T01:08:45.967
Link: CVE-2025-65518
OpenCVE Enrichment
Updated: 2026-01-09T13:26:07Z