An unauthenticated remote attacker can obtain valid session tokens because they are exposed in plaintext within the URL parameters of the wwwupdate.cgi endpoint in UBR.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
History

Mon, 09 Mar 2026 08:30:00 +0000

Type Values Removed Values Added
Description An unauthenticated remote attacker can obtain valid session tokens because they are exposed in plaintext within the URL parameters of the wwwupdate.cgi endpoint in UBR.
Title wwwupdate.cgi Session token in URL
Weaknesses CWE-598
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2026-03-09T08:18:49.918Z

Reserved: 2025-04-16T11:18:45.761Z

Link: CVE-2025-41772

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-09T09:16:01.537

Modified: 2026-03-09T09:16:01.537

Link: CVE-2025-41772

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses