Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-72f9-ghc4-fpv2

Опубликовано: 27 дек. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 2.1
CVSS3: 6.3

Описание

A weakness has been identified in getmaxun maxun up to 0.0.28. The affected element is the function router.get of the file server/src/routes/auth.ts of the component Authentication Endpoint. Executing manipulation can lead to improper authorization. The attack can be executed remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

A weakness has been identified in getmaxun maxun up to 0.0.28. The affected element is the function router.get of the file server/src/routes/auth.ts of the component Authentication Endpoint. Executing manipulation can lead to improper authorization. The attack can be executed remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 22%
0.00072
Низкий

2.1 Low

CVSS4

6.3 Medium

CVSS3

Дефекты

CWE-266
CWE-639

Связанные уязвимости

CVSS3: 6.3
nvd
около 1 месяца назад

A weakness has been identified in getmaxun maxun up to 0.0.28. The affected element is the function router.get of the file server/src/routes/auth.ts of the component Authentication Endpoint. Executing manipulation can lead to improper authorization. The attack can be executed remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 22%
0.00072
Низкий

2.1 Low

CVSS4

6.3 Medium

CVSS3

Дефекты

CWE-266
CWE-639