CVE-2025-48928

The TeleMessage service through 2025-05-05 is based on a JSP application in which the heap content is roughly equivalent to a "core dump" in which a password previously sent over HTTP would be included in this dump, as exploited in the wild in May 2025.
Configurations

Configuration 1 (hide)

cpe:2.3:a:smarsh:telemessage:-:*:*:*:*:*:*:*

History

21 Oct 2025, 23:17

Type Values Removed Values Added
References
  • () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-48928 -

21 Oct 2025, 20:20

Type Values Removed Values Added
References
  • {'url': 'https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-48928', 'source': '134c704f-9b21-4f2e-91b3-4a467353bcc0'}

21 Oct 2025, 19:21

Type Values Removed Values Added
References
  • () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-48928 -

02 Jul 2025, 17:55

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-28 17:15

Updated : 2025-10-21 23:17


NVD link : CVE-2025-48928

Mitre link : CVE-2025-48928

CVE.ORG link : CVE-2025-48928


JSON object : View

Products Affected

smarsh

  • telemessage
CWE
CWE-528

Exposure of Core Dump File to an Unauthorized Control Sphere

CWE-552

Files or Directories Accessible to External Parties