Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vgjr-hr6j-63h6

Опубликовано: 21 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 8.8

Описание

Aikaan IoT management platform v3.25.0325-5-g2e9c59796 sends a newly generated password to users in plaintext via email and also includes the same password as a query parameter in the account activation URL (e.g., https://domain.com/activate=xyz). This practice can result in password exposure via browser history, proxy logs, referrer headers, and email caching. The vulnerability impacts user credential confidentiality during initial onboarding.

Aikaan IoT management platform v3.25.0325-5-g2e9c59796 sends a newly generated password to users in plaintext via email and also includes the same password as a query parameter in the account activation URL (e.g., https://domain.com/activate=xyz). This practice can result in password exposure via browser history, proxy logs, referrer headers, and email caching. The vulnerability impacts user credential confidentiality during initial onboarding.

EPSS

Процентиль: 10%
0.00034
Низкий

8.8 High

CVSS3

Дефекты

CWE-319

Связанные уязвимости

CVSS3: 8.8
nvd
6 месяцев назад

Aikaan IoT management platform v3.25.0325-5-g2e9c59796 sends a newly generated password to users in plaintext via email and also includes the same password as a query parameter in the account activation URL (e.g., https://domain.com/activate=xyz). This practice can result in password exposure via browser history, proxy logs, referrer headers, and email caching. The vulnerability impacts user credential confidentiality during initial onboarding.

EPSS

Процентиль: 10%
0.00034
Низкий

8.8 High

CVSS3

Дефекты

CWE-319