QuickCMS sends password and login via GET Request. This allows a local attacker with access to the victim's browser history to obtain the necessary credentials to log in as the user.
The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.8 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
Metrics
Affected Vendors & Products
References
History
Thu, 28 Aug 2025 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Opensolution
Opensolution quick.cms |
|
Vendors & Products |
Opensolution
Opensolution quick.cms |
Thu, 28 Aug 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 28 Aug 2025 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | QuickCMS sends password and login via GET Request. This allows a local attacker with access to the victim's browser history to obtain the necessary credentials to log in as the user. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.8 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable. | |
Title | Sending Password in GET Request | |
Weaknesses | CWE-598 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: CERT-PL
Published: 2025-08-28T10:12:38.118Z
Updated: 2025-08-28T13:36:30.203Z
Reserved: 2025-07-24T13:28:55.489Z
Link: CVE-2025-54542

Updated: 2025-08-28T13:36:23.457Z

Status : Awaiting Analysis
Published: 2025-08-28T11:15:32.510
Modified: 2025-08-29T16:24:09.860
Link: CVE-2025-54542

No data.