The SIMPLE.ERP client stores superuser password in a recoverable format, allowing any authenticated SIMPLE.ERP user to escalate privileges to a database administrator.
This issue affect SIMPLE.ERP from 6.20 through 6.30. Only the 6.30 version received a patch [email protected], which removed the vulnerability. Versions 6.20 and 6.25 remain unpatched.
Metrics
Affected Vendors & Products
References
History
Mon, 24 Mar 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 24 Mar 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The SIMPLE.ERP client stores superuser password in a recoverable format, allowing any authenticated SIMPLE.ERP user to escalate privileges to a database administrator. This issue affect SIMPLE.ERP from 6.20 through 6.30. Only the 6.30 version received a patch [email protected], which removed the vulnerability. Versions 6.20 and 6.25 remain unpatched. | |
Title | Privilege Escalation in SIMPLE.ERP | |
Weaknesses | CWE-257 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: CERT-PL
Published: 2025-03-24T12:34:44.074Z
Updated: 2025-03-24T13:02:21.414Z
Reserved: 2024-09-13T07:44:59.997Z
Link: CVE-2024-8774

Updated: 2025-03-24T13:02:17.942Z

Status : Awaiting Analysis
Published: 2025-03-24T13:15:25.693
Modified: 2025-03-27T16:44:44.143
Link: CVE-2024-8774

No data.