CVE-2025-48952
BaseFortify
Publication date: 2025-07-04
Last updated on: 2025-08-06
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| netalertx | netalertx | to 25.6.7 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-697 | The product compares two entities in a security-relevant context, but the comparison is incorrect. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in NetAlertX prior to version 25.6.7 allows attackers to bypass password verification due to the use of loose comparison (==) in PHP when checking passwords. Specifically, passwords that produce SHA-256 hashes starting with '0e' followed only by digits can be interpreted as zero in scientific notation, causing the comparison to evaluate as true even if the passwords do not match. This enables unauthorized users to bypass authentication.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized access to services relying on NetAlertX authentication, as attackers can bypass password verification. This compromises confidentiality, integrity, and availability of the system, potentially allowing attackers to gain control or access sensitive information.
What immediate steps should I take to mitigate this vulnerability?
Upgrade NetAlertX to version 25.6.7 or later, as this version fixes the authentication bypass vulnerability caused by loose comparison of SHA-256 magic hashes.