PT-2025-28025 · Netalertx · Netalertx

Sakuya9461

·

Published

2025-06-07

·

Updated

2025-08-06

·

CVE-2025-48952

CVSS v3.1
9.7
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

**Name of the Vulnerable Software and Affected Versions:**

NetAlertX versions prior to 25.6.7

**Description:**

NetAlertX is a network, presence scanner, and alert framework. A vulnerability in the authentication logic allows users to bypass password verification using SHA-256 magic hashes due to a loose comparison in PHP. In vulnerable versions of the application, a password comparison is performed using the `==` operator at line 40 in `front/index.php`. This allows specially crafted "magic hash" values to bypass authentication because the `==` operator, instead of the strict `===` operator, can interpret strings starting with '0e' followed by digits as scientific notation (zero). This issue is classified as a Login Bypass vulnerability. Services relying on this logic are at risk of unauthorized access. Approximately 109 services are potentially affected worldwide.

**Recommendations:**

Upgrade to NetAlertX version 25.6.7 or later.

Exploit

Fix

Weakness Enumeration

Related Identifiers

BDU:2025-08221
CVE-2025-48952
GHSA-4P4P-VQ2V-9489

Affected Products

Netalertx