CVE-2025-26199
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-07-09
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| vishalmathur | cloudclassroom-php_project | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-319 | The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in CloudClassroom PHP Project v1.0 allows a remote attacker to intercept and obtain administrator passwords because the admin login system transmits credentials in cleartext over an unencrypted HTTP connection. This means passwords are sent without encryption, making them visible to anyone monitoring the network traffic, which can lead to credential theft and potential full system compromise. [1]
How can this vulnerability impact me? :
The vulnerability can lead to attackers stealing administrator credentials by intercepting unencrypted login data. If attackers obtain these credentials, they can gain unauthorized access to the system, potentially leading to full system compromise, data breaches, and unauthorized actions within the application or network. [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability negatively impacts compliance with standards like GDPR and HIPAA because it exposes sensitive authentication data in cleartext, violating requirements for protecting personal and sensitive information during transmission. Failure to secure credentials with encryption can lead to non-compliance with data protection regulations that mandate secure handling of sensitive data. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by capturing and inspecting network traffic to see if administrator credentials are transmitted in cleartext over HTTP. Tools like Wireshark or tcpdump can be used to sniff the network traffic. For example, using tcpdump you can run: tcpdump -i <interface> -A -s 0 'tcp port 80' and then look for POST requests to the adminlogin endpoint containing plaintext passwords. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include enforcing HTTPS for all authentication routes to ensure credentials are encrypted in transit, implementing secure password hashing algorithms such as bcrypt, and avoiding logging or displaying credentials in application code to prevent exposure. [1]