CVE-2025-61679
BaseFortify
Publication date: 2025-10-03
Last updated on: 2025-10-06
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| julien040 | anyquery | 0.4.3 |
| julien040 | anyquery | 0.4.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-287 | When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. |
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Anyquery versions 0.4.3 and below, where attackers who have already gained access to localhost, even with low privileges, can use the HTTP server on the port without authentication. This allows them to access private integration data such as emails without any warning of a foreign login from the provider. The issue is fixed in version 0.4.4.
How can this vulnerability impact me? :
The vulnerability can allow an attacker with local access and low privileges to access sensitive private data, such as emails, through the HTTP server without authentication or warning. This can lead to unauthorized data exposure and potential misuse of private integration data.
What immediate steps should I take to mitigate this vulnerability?
Upgrade Anyquery to version 0.4.4 or later, as this version fixes the vulnerability allowing unauthenticated access to private integration data via the HTTP server.