CVE-2025-26199
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-18

Last updated on: 2025-07-09

Assigner: MITRE

Description
CloudClassroom-PHP-Project v1.0 is affected by an insecure credential transmission vulnerability. The application transmits passwords over unencrypted HTTP during the login process, exposing sensitive credentials to potential interception by network-based attackers. A remote attacker with access to the same network (e.g., public Wi-Fi or compromised router) can capture login credentials via Man-in-the-Middle (MitM) techniques. If the attacker subsequently uses the credentials to log in and exploit administrative functions (e.g., file upload), this may lead to remote code execution depending on the environment.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-18
Last Modified
2025-07-09
Generated
2026-05-07
AI Q&A
2025-06-18
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
vishalmathur cloudclassroom-php_project 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-319 The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in CloudClassroom PHP Project v1.0 allows a remote attacker to intercept and obtain administrator passwords because the admin login system transmits credentials in cleartext over an unencrypted HTTP connection. This means passwords are sent without encryption, making them visible to anyone monitoring the network traffic, which can lead to credential theft and potential full system compromise. [1]


How can this vulnerability impact me? :

The vulnerability can lead to attackers stealing administrator credentials by intercepting unencrypted login data. If attackers obtain these credentials, they can gain unauthorized access to the system, potentially leading to full system compromise, data breaches, and unauthorized actions within the application or network. [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability negatively impacts compliance with standards like GDPR and HIPAA because it exposes sensitive authentication data in cleartext, violating requirements for protecting personal and sensitive information during transmission. Failure to secure credentials with encryption can lead to non-compliance with data protection regulations that mandate secure handling of sensitive data. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by capturing and inspecting network traffic to see if administrator credentials are transmitted in cleartext over HTTP. Tools like Wireshark or tcpdump can be used to sniff the network traffic. For example, using tcpdump you can run: tcpdump -i <interface> -A -s 0 'tcp port 80' and then look for POST requests to the adminlogin endpoint containing plaintext passwords. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include enforcing HTTPS for all authentication routes to ensure credentials are encrypted in transit, implementing secure password hashing algorithms such as bcrypt, and avoiding logging or displaying credentials in application code to prevent exposure. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart