CVE-2025-48929

The TeleMessage service through 2025-05-05 implements authentication through a long-lived credential (e.g., not a token with a short expiration time) that can be reused at a later date if discovered by an adversary.
Configurations

Configuration 1 (hide)

cpe:2.3:a:smarsh:telemessage:*:*:*:*:*:*:*:*

History

22 Oct 2025, 15:01

Type Values Removed Values Added
First Time Smarsh telemessage
Smarsh
CWE CWE-613
References () https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/ - () https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/ - Press/Media Coverage
CPE cpe:2.3:a:smarsh:telemessage:*:*:*:*:*:*:*:*

01 Jul 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-28 17:15

Updated : 2025-10-22 15:01


NVD link : CVE-2025-48929

Mitre link : CVE-2025-48929

CVE.ORG link : CVE-2025-48929


JSON object : View

Products Affected

smarsh

  • telemessage
CWE
CWE-922

Insecure Storage of Sensitive Information

CWE-613

Insufficient Session Expiration