Логотип exploitDog
bind:CVE-2025-66028
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-66028

Количество 2

Количество 2

nvd логотип

CVE-2025-66028

2 месяца назад

OneUptime is a solution for monitoring and managing online services. Prior to version 8.0.5567, OneUptime is vulnerable to privilege escalation via Login Response Manipulation. During the login process, the server response included a parameter called isMasterAdmin. By intercepting and modifying this parameter value from false to true, it is possible to gain access to the admin dashboard interface. However, an attacker may be unable to view or interact with the data if they still do not have sufficient permissions. This issue has been patched in version 8.0.5567.

CVSS3: 8.2
EPSS: Низкий
github логотип

GHSA-675q-66gf-gqg8

3 месяца назад

OneUptime is Vulnerable to Privilege Escalation via Login Response Manipulation

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-66028

OneUptime is a solution for monitoring and managing online services. Prior to version 8.0.5567, OneUptime is vulnerable to privilege escalation via Login Response Manipulation. During the login process, the server response included a parameter called isMasterAdmin. By intercepting and modifying this parameter value from false to true, it is possible to gain access to the admin dashboard interface. However, an attacker may be unable to view or interact with the data if they still do not have sufficient permissions. This issue has been patched in version 8.0.5567.

CVSS3: 8.2
0%
Низкий
2 месяца назад
github логотип
GHSA-675q-66gf-gqg8

OneUptime is Vulnerable to Privilege Escalation via Login Response Manipulation

0%
Низкий
3 месяца назад

Уязвимостей на страницу