{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-8260","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-07-26T16:14:24.601Z","datePublished":"2025-07-28T06:02:05.309Z","dateUpdated":"2026-04-15T07:02:44.090Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-04-15T07:02:44.090Z"},"title":"Vaelsys VaelsysV4 Web interface vgrid_server.php weak hash","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-328","lang":"en","description":"Use of Weak Hash"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-327","lang":"en","description":"Risky Cryptographic Algorithm"}]}],"affected":[{"vendor":"Vaelsys","product":"VaelsysV4","versions":[{"version":"5.0","status":"affected"},{"version":"5.1","status":"affected"},{"version":"5.1.0","status":"affected"},{"version":"5.2","status":"affected"},{"version":"5.3","status":"affected"},{"version":"5.4.0","status":"affected"},{"version":"5.1.1","status":"unaffected"},{"version":"5.4.1","status":"unaffected"}],"modules":["Web interface"]}],"descriptions":[{"lang":"en","value":"A security flaw has been discovered in Vaelsys VaelsysV4 up to 5.1.0/5.4.0. This affects an unknown part of the file /grid/vgrid_server.php of the component Web interface. Performing a manipulation of the argument xajaxargs results in use of weak hash. The attack is possible to be carried out remotely. The complexity of an attack is rather high. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be used for attacks. Upgrading to version 5.1.1 and 5.4.1 is able to mitigate this issue. Upgrading the affected component is recommended."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":2.3,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"LOW"}},{"cvssV3_1":{"version":"3.1","baseScore":3.1,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.1,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":2.1,"vectorString":"AV:N/AC:H/Au:S/C:P/I:N/A:N/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2025-07-26T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-03-20T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-04-15T09:07:00.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"waiwai24 (VulDB User)","type":"reporter"},{"lang":"en","value":"security_vaelsys (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/vuln/317848","name":"VDB-317848 | Vaelsys VaelsysV4 Web interface vgrid_server.php weak hash","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/317848/cti","name":"VDB-317848 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/616922","name":"Submit #616922 | Vaelsys Vaelsys V4 v4.1.0  Unauthorized Access Leads to Sensitive Information Leakage","tags":["third-party-advisory"]},{"url":"https://github.com/waiwai24/0101/blob/main/CVEs/Vaelsys/Unauthorized_Access_Leads_to_Sensitive_Information_Leakage_in_Vaelsys_V4_Platform.md","tags":["exploit"]},{"url":"https://vaelsys.github.io/security-advisory/advisories/VSEC_V4_2025_07_0002.html","tags":["patch"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-07-28T15:57:53.324478Z","id":"CVE-2025-8260","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-28T15:58:03.186Z"}}]}}