An unauthenticated remote attacker can obtain valid session tokens because they are exposed in plaintext within the URL parameters of the wwwupdate.cgi endpoint in UBR.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.mbs-solutions.de/mbs-2025-0001 |
|
History
Mon, 09 Mar 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthenticated remote attacker can obtain valid session tokens because they are exposed in plaintext within the URL parameters of the wwwupdate.cgi endpoint in UBR. | |
| Title | wwwupdate.cgi Session token in URL | |
| Weaknesses | CWE-598 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2026-03-09T08:18:49.918Z
Reserved: 2025-04-16T11:18:45.761Z
Link: CVE-2025-41772
No data.
Status : Received
Published: 2026-03-09T09:16:01.537
Modified: 2026-03-09T09:16:01.537
Link: CVE-2025-41772
No data.
OpenCVE Enrichment
No data.
Weaknesses