Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://checkmk.com/werk/17105 |
|
Tue, 14 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Oct 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Checkmk
Checkmk checkmk |
|
| Vendors & Products |
Checkmk
Checkmk checkmk |
Thu, 09 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Potential use of sensitive information in GET requests in Checkmk GmbH's Checkmk versions <2.4.0p13, <2.3.0p38, <2.2.0p46, and 2.1.0 (EOL) may cause sensitive form data to be included in URL query parameters, which may be logged in various places such as browser history or web server logs. | |
| Title | Sensitive form data in URL query parameters | |
| Weaknesses | CWE-598 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Checkmk
Published:
Updated: 2025-10-14T14:16:57.077Z
Reserved: 2025-04-14T09:52:19.273Z
Link: CVE-2025-32916
Updated: 2025-10-09T15:11:46.984Z
Status : Awaiting Analysis
Published: 2025-10-09T15:16:05.503
Modified: 2025-10-09T15:50:04.013
Link: CVE-2025-32916
No data.
OpenCVE Enrichment
Updated: 2025-10-10T11:17:52Z