QuickCMS sends password and login via GET Request. This allows a local attacker with access to the victim's browser history to obtain the necessary credentials to log in as the user. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.8 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
History

Thu, 28 Aug 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Opensolution
Opensolution quick.cms
Vendors & Products Opensolution
Opensolution quick.cms

Thu, 28 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 28 Aug 2025 12:30:00 +0000

Type Values Removed Values Added
Description QuickCMS sends password and login via GET Request. This allows a local attacker with access to the victim's browser history to obtain the necessary credentials to log in as the user. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.8 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
Title Sending Password in GET Request
Weaknesses CWE-598
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published: 2025-08-28T10:12:38.118Z

Updated: 2025-08-28T13:36:30.203Z

Reserved: 2025-07-24T13:28:55.489Z

Link: CVE-2025-54542

cve-icon Vulnrichment

Updated: 2025-08-28T13:36:23.457Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-28T11:15:32.510

Modified: 2025-08-29T16:24:09.860

Link: CVE-2025-54542

cve-icon Redhat

No data.