{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-59784","assignerOrgId":"be69f613-e5f6-419b-800c-30351aa8933c","state":"PUBLISHED","assignerShortName":"2N","dateReserved":"2025-09-19T17:22:49.648Z","datePublished":"2026-03-04T15:26:47.073Z","dateUpdated":"2026-03-04T16:16:44.717Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["Linux"],"product":"2N Access Commander","vendor":"2N Telekomunikace a.s.","versions":[{"lessThan":"3.4.2","status":"affected","version":"0","versionType":"Release"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>2N Access Commander version 3.4.1 and prior is vulnerable to log pollution. Certain parameters sent over API may be included in the logs without prior validation or sanitisation.<br>This vulnerability can only be exploited after authenticating with administrator privileges.<br></p>"}],"value":"2N Access Commander version 3.4.1 and prior is vulnerable to log pollution. Certain parameters sent over API may be included in the logs without prior validation or sanitisation.\nThis vulnerability can only be exploited after authenticating with administrator privileges."}],"impacts":[{"capecId":"CAPEC-93","descriptions":[{"lang":"en","value":"CAPEC-93 Log Injection-Tampering-Forging"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":6.9,"baseSeverity":"MEDIUM","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-117","description":"CWE-117: Improper Output Neutralization for Logs","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"be69f613-e5f6-419b-800c-30351aa8933c","shortName":"2N","dateUpdated":"2026-03-04T15:59:59.350Z"},"references":[{"tags":["vendor-advisory"],"url":"https://www.2n.com/en-GB/download/cve_2025_59784_acom_3_5_v1pdf"}],"source":{"discovery":"UNKNOWN"},"title":"Log Pollution - Control Characters Not Escaped","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-04T16:16:38.878662Z","id":"CVE-2025-59784","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-04T16:16:44.717Z"}}]}}