Primakon Pi Portal 1.0.18 /api/v2/users endpoint is vulnerable to unauthorized data exposure due to deficient access control mechanisms. Any authenticated user, regardless of their privilege level (including standard or low-privileged users), can make a GET request to this endpoint and retrieve a complete, unfiltered list of all registered application users. Crucially, the API response body for this endpoint includes password hashes.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 25 Nov 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-497 | |
| Metrics |
cvssV3_1
|
Tue, 25 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Primakon Pi Portal 1.0.18 /api/v2/users endpoint is vulnerable to unauthorized data exposure due to deficient access control mechanisms. Any authenticated user, regardless of their privilege level (including standard or low-privileged users), can make a GET request to this endpoint and retrieve a complete, unfiltered list of all registered application users. Crucially, the API response body for this endpoint includes password hashes. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-25T19:16:45.700Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-64061
Updated: 2025-11-25T18:36:06.428Z
Status : Awaiting Analysis
Published: 2025-11-25T17:15:50.440
Modified: 2025-11-25T22:16:16.690
Link: CVE-2025-64061
No data.
OpenCVE Enrichment
No data.