CVE-2025-56527
BaseFortify
Publication date: 2025-11-18
Last updated on: 2025-12-02
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cinnamon | kotaemon | to 0.11.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-256 | The product stores a password in plaintext within resources such as memory or files. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the storage of plaintext passwords in the localStorage of the client's browser in Kotaemon version 0.11.0. This means that user passwords are saved without encryption or hashing, making them easily accessible to anyone who can access the localStorage data on the client side.
How can this vulnerability impact me? :
The impact of this vulnerability is that attackers who gain access to the client's device or browser data can retrieve user passwords in plaintext. This can lead to unauthorized access to user accounts, potential account takeover, and compromise of user data. Since the passwords are not protected, the risk of credential theft is high.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
Storing passwords in plaintext likely violates security requirements in common standards and regulations such as GDPR and HIPAA, which mandate protecting personal and sensitive data through appropriate security measures. This vulnerability could lead to non-compliance due to inadequate protection of user credentials, increasing the risk of data breaches and associated legal consequences.