Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2025-22954 | An API endpoint that should be limited to web application administrators is hidden from, but accessible by, lower-level read only web application users. The endpoint can be used to import the appliance configuration, allowing an attacker to control the configuration of the appliance, to include granting themselves administrative level permissions. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 09 Oct 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Xorux xormon
|
|
CPEs | cpe:2.3:a:xorux:xormon:*:*:*:*:*:*:*:* | |
Vendors & Products |
Xorux xormon
|
Tue, 29 Jul 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Tue, 29 Jul 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Xorux
Xorux xormon-ng |
|
Vendors & Products |
Xorux
Xorux xormon-ng |
Mon, 28 Jul 2025 23:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An API endpoint that should be limited to web application administrators is hidden from, but accessible by, lower-level read only web application users. The endpoint can be used to import the appliance configuration, allowing an attacker to control the configuration of the appliance, to include granting themselves administrative level permissions. | |
Title | KL-001-2025-013: Xorux XorMon-NG Web Application Privilege Escalation to Administrator | |
Weaknesses | CWE-648 | |
References |
|

Status: PUBLISHED
Assigner: KoreLogic
Published:
Updated: 2025-07-29T13:30:23.481Z
Reserved: 2025-07-28T16:02:18.185Z
Link: CVE-2025-54765

Updated: 2025-07-29T13:30:16.029Z

Status : Analyzed
Published: 2025-07-29T00:15:23.737
Modified: 2025-10-09T17:43:08.427
Link: CVE-2025-54765

No data.

Updated: 2025-07-29T10:00:55Z