An API endpoint that should be limited to web application administrators is hidden from, but accessible by, lower-level read only web application users. The endpoint can be used to import the appliance configuration, allowing an attacker to control the configuration of the appliance, to include granting themselves administrative level permissions.
References
Link | Resource |
---|---|
https://korelogic.com/Resources/Advisories/KL-001-2025-013.txt | Exploit Third Party Advisory |
https://xormon.com/note190.php | Release Notes |
Configurations
History
09 Oct 2025, 17:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://korelogic.com/Resources/Advisories/KL-001-2025-013.txt - Exploit, Third Party Advisory | |
References | () https://xormon.com/note190.php - Release Notes | |
CPE | cpe:2.3:a:xorux:xormon:*:*:*:*:*:*:*:* | |
First Time |
Xorux xormon
Xorux |
29 Jul 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
Summary |
|
29 Jul 2025, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-29 00:15
Updated : 2025-10-09 17:43
NVD link : CVE-2025-54765
Mitre link : CVE-2025-54765
CVE.ORG link : CVE-2025-54765
JSON object : View
Products Affected
xorux
- xormon
CWE
CWE-648
Incorrect Use of Privileged APIs