CVE-2025-48952 (GCVE-0-2025-48952)

Vulnerability from cvelistv5 – Published: 2025-07-04 22:12 – Updated: 2025-07-08 13:51
VLAI?
Summary
NetAlertX is a network, presence scanner, and alert framework. Prior to version 25.6.7, a vulnerability in the authentication logic allows users to bypass password verification using SHA-256 magic hashes, due to loose comparison in PHP. In vulnerable versions of the application, a password comparison is performed using the `==` operator at line 40 in front/index.php. This introduces a security issue where specially crafted "magic hash" values that evaluate to true in a loose comparison can bypass authentication. Because of the use of `==` instead of the strict `===`, different strings that begin with 0e and are followed by only digits can be interpreted as scientific notation (i.e., zero) and treated as equal. This issue falls under the Login Bypass vulnerability class. Users with certain "weird" passwords that produce magic hashes are particularly affected. Services relying on this logic are at risk of unauthorized access. Version 25.6.7 fixes the vulnerability.
CWE
Assigner
References
Impacted products
Vendor Product Version
jokob-sk NetAlertX Affected: < 25.6.7
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-48952",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-08T13:51:30.455776Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-08T13:51:33.982Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "exploit"
            ],
            "url": "https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-4p4p-vq2v-9489"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "NetAlertX",
          "vendor": "jokob-sk",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 25.6.7"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "NetAlertX is a network, presence scanner, and alert framework. Prior to version 25.6.7, a vulnerability in the authentication logic allows users to bypass password verification using SHA-256 magic hashes, due to loose comparison in PHP. In vulnerable versions of the application, a password comparison is performed using the `==` operator at line 40 in front/index.php. This introduces a security issue where specially crafted \"magic hash\" values that evaluate to true in a loose comparison can bypass authentication. Because of the use of `==` instead of the strict `===`, different strings that begin with 0e and are followed by only digits can be interpreted as scientific notation (i.e., zero) and treated as equal. This issue falls under the Login Bypass vulnerability class. Users with certain \"weird\" passwords that produce magic hashes are particularly affected. Services relying on this logic are at risk of unauthorized access. Version 25.6.7 fixes the vulnerability."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 9.4,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-697",
              "description": "CWE-697: Incorrect Comparison",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-04T22:12:54.601Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-4p4p-vq2v-9489",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-4p4p-vq2v-9489"
        }
      ],
      "source": {
        "advisory": "GHSA-4p4p-vq2v-9489",
        "discovery": "UNKNOWN"
      },
      "title": "NetAlertX has Password Bypass Vulnerability due to Loose Comparison in PHP"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2025-48952",
    "datePublished": "2025-07-04T22:12:54.601Z",
    "dateReserved": "2025-05-28T18:49:07.585Z",
    "dateUpdated": "2025-07-08T13:51:33.982Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-48952\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-07-04T23:15:21.760\",\"lastModified\":\"2025-08-06T17:48:07.287\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"NetAlertX is a network, presence scanner, and alert framework. Prior to version 25.6.7, a vulnerability in the authentication logic allows users to bypass password verification using SHA-256 magic hashes, due to loose comparison in PHP. In vulnerable versions of the application, a password comparison is performed using the `==` operator at line 40 in front/index.php. This introduces a security issue where specially crafted \\\"magic hash\\\" values that evaluate to true in a loose comparison can bypass authentication. Because of the use of `==` instead of the strict `===`, different strings that begin with 0e and are followed by only digits can be interpreted as scientific notation (i.e., zero) and treated as equal. This issue falls under the Login Bypass vulnerability class. Users with certain \\\"weird\\\" passwords that produce magic hashes are particularly affected. Services relying on this logic are at risk of unauthorized access. Version 25.6.7 fixes the vulnerability.\"},{\"lang\":\"es\",\"value\":\"NetAlertX es un framework de red, esc\u00e1ner de presencia y alertas. Antes de la versi\u00f3n 25.6.7, una vulnerabilidad en la l\u00f3gica de autenticaci\u00f3n permit\u00eda a los usuarios eludir la verificaci\u00f3n de contrase\u00f1as mediante hashes m\u00e1gicos SHA-256 debido a una comparaci\u00f3n imprecisa en PHP. En versiones vulnerables de la aplicaci\u00f3n, se realiza una comparaci\u00f3n de contrase\u00f1as mediante el operador `==` en la l\u00ednea 40 de front/index.php. Esto genera un problema de seguridad: valores de \\\"hash m\u00e1gico\\\" especialmente manipulados, que se eval\u00faan como verdaderos en una comparaci\u00f3n imprecisa, pueden eludir la autenticaci\u00f3n. Debido al uso de `==` en lugar del estricto `===`, diferentes cadenas que comienzan con 0e y van seguidas solo de d\u00edgitos pueden interpretarse como notaci\u00f3n cient\u00edfica (es decir, cero) y tratarse como iguales. Este problema se enmarca en la vulnerabilidad de omisi\u00f3n de inicio de sesi\u00f3n. Los usuarios con ciertas contrase\u00f1as \\\"extra\u00f1as\\\" que generan hashes m\u00e1gicos se ven especialmente afectados. Los servicios que dependen de esta l\u00f3gica corren el riesgo de acceso no autorizado. La versi\u00f3n 25.6.7 corrige esta vulnerabilidad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L\",\"baseScore\":9.4,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":5.5}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-697\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netalertx:netalertx:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"25.6.7\",\"matchCriteriaId\":\"CD0B1FF5-743B-4BE2-BF2A-942C62B99DF1\"}]}]}],\"references\":[{\"url\":\"https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-4p4p-vq2v-9489\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-4p4p-vq2v-9489\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-48952\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-08T13:51:30.455776Z\"}}}], \"references\": [{\"url\": \"https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-4p4p-vq2v-9489\", \"tags\": [\"exploit\"]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-08T13:51:22.111Z\"}}], \"cna\": {\"title\": \"NetAlertX has Password Bypass Vulnerability due to Loose Comparison in PHP\", \"source\": {\"advisory\": \"GHSA-4p4p-vq2v-9489\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.4, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"jokob-sk\", \"product\": \"NetAlertX\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 25.6.7\"}]}], \"references\": [{\"url\": \"https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-4p4p-vq2v-9489\", \"name\": \"https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-4p4p-vq2v-9489\", \"tags\": [\"x_refsource_CONFIRM\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"NetAlertX is a network, presence scanner, and alert framework. Prior to version 25.6.7, a vulnerability in the authentication logic allows users to bypass password verification using SHA-256 magic hashes, due to loose comparison in PHP. In vulnerable versions of the application, a password comparison is performed using the `==` operator at line 40 in front/index.php. This introduces a security issue where specially crafted \\\"magic hash\\\" values that evaluate to true in a loose comparison can bypass authentication. Because of the use of `==` instead of the strict `===`, different strings that begin with 0e and are followed by only digits can be interpreted as scientific notation (i.e., zero) and treated as equal. This issue falls under the Login Bypass vulnerability class. Users with certain \\\"weird\\\" passwords that produce magic hashes are particularly affected. Services relying on this logic are at risk of unauthorized access. Version 25.6.7 fixes the vulnerability.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-697\", \"description\": \"CWE-697: Incorrect Comparison\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-07-04T22:12:54.601Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-48952\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-07-08T13:51:33.982Z\", \"dateReserved\": \"2025-05-28T18:49:07.585Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2025-07-04T22:12:54.601Z\", \"assignerShortName\": \"GitHub_M\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…