Impact
A configuration oversight in Sage DPW version 2025_06_004 permits anyone to reach diagnostic endpoints of the Database Monitor feature without needing authentication. By accessing these endpoints, an attacker can retrieve sensitive data such as password hashes and database table names. The gap undermines confidentiality and could facilitate further exploitation if the attacker gains deeper insight into the system's structure.
Affected Systems
Sage DPW product version 2025_06_004 is affected. The vulnerability exists because the Database Monitor diagnostic endpoints are enabled by default in this release, whereas earlier releases such as 2025_06_003 had forced the feature to be disabled. The functionality is not present in the Sage DPW Cloud edition.
Risk and Exploitability
The CVSS v3 base score of 5.9 indicates a moderate severity, and the EPSS score of less than 1 percent suggests a low probability of widespread exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires unauthenticated HTTP access to the diagnostic endpoints, so an attacker does not need any credentials. If the endpoints are reachable over the network, an adversary could easily retrieve the exposed information, leading to potential credential compromise or later attacks against the underlying database.
OpenCVE Enrichment