CVE-2025-27143

CVE-2025-27143

Título es
CVE-2025-27143

Lun, 24/02/2025 – 23:15

Tipo
CWE-601

Gravedad 2.0 Txt
Pendiente de análisis

Título en

CVE-2025-27143

Descripción en
Better Auth is an authentication and authorization library for TypeScript. Prior to version 1.1.21, the application is vulnerable to an open redirect due to improper validation of the callbackURL parameter in the email verification endpoint and any other endpoint that accepts callback url. While the server blocks fully qualified URLs, it incorrectly allows scheme-less URLs. This results in the browser interpreting the URL as a fully qualified URL, leading to unintended redirection. An attacker can exploit this flaw by crafting a malicious verification link and tricking users into clicking it. Upon successful email verification, the user will be automatically redirected to the attacker's website, which can be used for phishing, malware distribution, or stealing sensitive authentication tokens. This CVE is a bypass of the fix for GHSA-8jhw-6pjj-8723/CVE-2024-56734. Version 1.1.21 contains an updated patch.

25/02/2025

25/02/2025

Vector CVSS:4.0
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Gravedad 4.0
6.90

Gravedad 4.0 txt
MEDIUM

Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
Pendiente de análisis

Referencias


  • https://github.com/better-auth/better-auth/commit/24659aefc35a536b95ea4e5347e52c8803910153

  • https://github.com/better-auth/better-auth/commit/b381cac7aafd6aa53ef78b6ab771ebfa24643c80

  • https://github.com/better-auth/better-auth/releases/tag/v1.1.21

  • https://github.com/better-auth/better-auth/security/advisories/GHSA-8jhw-6pjj-8723

  • https://github.com/better-auth/better-auth/security/advisories/GHSA-hjpm-7mrm-26w8
  • Enviar en el boletín
    Off

    CVE-2025-22974

    CVE-2025-22974

    Título es
    CVE-2025-22974

    Lun, 24/02/2025 – 23:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-22974

    Descripción en
    SQL Injection vulnerability in SeaCMS v.13.2 and before allows a remote attacker to execute arbitrary code via the DoTranExecSql parameter in the phome.php component.

    25/02/2025

    25/02/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://github.com/202110420106/CVE/blob/master/seacms/CVE-2025-22974.md
  • Enviar en el boletín
    Off

    CVE-2025-27364

    CVE-2025-27364

    Título es
    CVE-2025-27364

    Lun, 24/02/2025 – 19:15

    Tipo
    CWE-78

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-27364

    Descripción en
    In MITRE Caldera through 4.2.0 and 5.0.0 before 35bc06e, a Remote Code Execution (RCE) vulnerability was found in the dynamic agent (implant) compilation functionality of the server. This allows remote attackers to execute arbitrary code on the server that Caldera is running on via a crafted web request to the Caldera server API used for compiling and downloading of Caldera's Sandcat or Manx agent (implants). This web request can use the gcc -extldflags linker flag with sub-commands.

    24/02/2025

    24/02/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

    Gravedad 3.1 (CVSS 3.1 Base Score)
    10.00

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    CRITICAL

    Referencias


  • https://github.com/mitre/caldera/commit/35bc06e42e19fe7efbc008999b9f993b1b7109c0

  • https://github.com/mitre/caldera/pull/3129

  • https://github.com/mitre/caldera/pull/3131/commits/61de40f92a595bed462372a5e676c2e5a32d1050

  • https://github.com/mitre/caldera/releases

  • https://github.com/mitre/caldera/security

  • https://medium.com/@mitrecaldera/mitre-caldera-security-advisory-remote-code-execution-cve-2025-27364-5f679e2e2a0e

  • https://medium.com/@mitrecaldera/mitre-caldera-security-advisory-remote-code-execution-cve-2025-27364-5f679e2e2a0e
  • Enviar en el boletín
    Off

    CVE-2025-27133

    CVE-2025-27133

    Título es
    CVE-2025-27133

    Lun, 24/02/2025 – 19:15

    Tipo
    CWE-89

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-27133

    Descripción en
    WeGIA is a Web manager for charitable institutions. A SQL Injection vulnerability was discovered in the WeGIA application prior to version 3.2.15 at the `adicionar_tipo_exame.php` endpoint. This vulnerability allows an authorized attacker to execute arbitrary SQL queries, allowing access to sensitive information. Version 3.2.15 contains a patch for the issue.

    24/02/2025

    24/02/2025

    Vector CVSS:4.0
    CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

    Gravedad 4.0
    9.40

    Gravedad 4.0 txt
    CRITICAL

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://github.com/LabRedesCefetRJ/WeGIA/commit/619ead748e18e685459c6dc3c226e621b9ff5403

  • https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xj79-w799-qjcp
  • Enviar en el boletín
    Off

    CVE-2025-26531

    CVE-2025-26531

    Título es
    CVE-2025-26531

    Lun, 24/02/2025 – 20:15

    Tipo
    CWE-863

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-26531

    Descripción en
    Insufficient capability checks made it possible to disable badges a user does not have permission to access.

    24/02/2025

    24/02/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    3.10

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    LOW

    Referencias


  • http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84239

  • https://moodle.org/mod/forum/discuss.php?d=466148
  • Enviar en el boletín
    Off

    CVE-2025-26530

    CVE-2025-26530

    Título es
    CVE-2025-26530

    Lun, 24/02/2025 – 20:15

    Tipo
    CWE-79

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-26530

    Descripción en
    The question bank filter required additional sanitizing to prevent a reflected XSS risk.

    24/02/2025

    24/02/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

    Gravedad 3.1 (CVSS 3.1 Base Score)
    8.30

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    HIGH

    Referencias


  • http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84146

  • https://moodle.org/mod/forum/discuss.php?d=466146
  • Enviar en el boletín
    Off

    CVE-2025-26529

    CVE-2025-26529

    Título es
    CVE-2025-26529

    Lun, 24/02/2025 – 20:15

    Tipo
    CWE-79

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-26529

    Descripción en
    Description information displayed in the site administration live log
    required additional sanitizing to prevent a stored XSS risk.

    24/02/2025

    24/02/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

    Gravedad 3.1 (CVSS 3.1 Base Score)
    8.30

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    HIGH

    Referencias


  • http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84145

  • https://moodle.org/mod/forum/discuss.php?d=466145
  • Enviar en el boletín
    Off

    CVE-2025-26528

    CVE-2025-26528

    Título es
    CVE-2025-26528

    Lun, 24/02/2025 – 20:15

    Tipo
    CWE-79

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-26528

    Descripción en
    The drag-and-drop onto image (ddimageortext) question type required additional sanitizing to prevent a stored XSS risk.

    24/02/2025

    24/02/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    3.40

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    LOW

    Referencias


  • http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-82896

  • https://moodle.org/mod/forum/discuss.php?d=466144
  • Enviar en el boletín
    Off

    CVE-2025-26527

    CVE-2025-26527

    Título es
    CVE-2025-26527

    Lun, 24/02/2025 – 20:15

    Tipo
    CWE-1230

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-26527

    Descripción en
    Tags not expected to be visible to a user could still be discovered by them via the tag search page or in the tags block.

    24/02/2025

    24/02/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    5.30

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    MEDIUM

    Referencias


  • http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-83941

  • https://moodle.org/mod/forum/discuss.php?d=466143
  • Enviar en el boletín
    Off

    CVE-2025-26526

    CVE-2025-26526

    Título es
    CVE-2025-26526

    Lun, 24/02/2025 – 20:15

    Tipo
    CWE-863

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-26526

    Descripción en
    Separate Groups mode restrictions were not factored into permission
    checks before allowing viewing or deletion of responses in Feedback
    activities.

    24/02/2025

    24/02/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    6.50

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    MEDIUM

    Referencias


  • http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79976

  • https://moodle.org/mod/forum/discuss.php?d=466142
  • Enviar en el boletín
    Off