Impact
The vulnerability stems from improper filtering of private location entries in the web API. When the list is modified while iterating, elements marked as private may remain in the response, exposing non‑public location data. This results in an information disclosure weakness (CWE‑200).
Affected Systems
The affected system is the RansomLook tool. All releases prior to version 1.9.0 are impacted. The defect was corrected in version 1.9.0, where the list‑modification logic that caused private entries to leak was removed.
Risk and Exploitability
With a CVSS score of 6.9, the vulnerability represents moderate severity. The exploitation vector is through the exposed API endpoints, which is inferred as a network‑based attack path. An attacker who can reach the API, without additional authentication, could retrieve private location data. The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog.
OpenCVE Enrichment