PT-2025-28025 · Netalertx · Netalertx
Sakuya9461
·
Published
2025-06-07
·
Updated
2025-08-06
·
CVE-2025-48952
9.7
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L |
**Name of the Vulnerable Software and Affected Versions:**
NetAlertX versions prior to 25.6.7
**Description:**
NetAlertX is a network, presence scanner, and alert framework. A vulnerability in the authentication logic allows users to bypass password verification using SHA-256 magic hashes due to a loose comparison in PHP. In vulnerable versions of the application, a password comparison is performed using the `==` operator at line 40 in `front/index.php`. This allows specially crafted "magic hash" values to bypass authentication because the `==` operator, instead of the strict `===` operator, can interpret strings starting with '0e' followed by digits as scientific notation (zero). This issue is classified as a Login Bypass vulnerability. Services relying on this logic are at risk of unauthorized access. Approximately 109 services are potentially affected worldwide.
**Recommendations:**
Upgrade to NetAlertX version 25.6.7 or later.
Exploit
Fix
Weakness Enumeration
Related Identifiers
Affected Products
References · 16
- 🔥 https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-4p4p-vq2v-9489⭐ 4596 🔗 270 · Exploit
- https://bdu.fstec.ru/vul/2025-08221 · Security Note
- https://osv.dev/vulnerability/CVE-2025-48952 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-48952 · Security Note
- https://github.com/jokob-sk/NetAlertX⭐ 4477 🔗 264 · Note
- https://twitter.com/CveFindCom/status/1941265853216887118 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1lvexd0/top_10_trending_cves_09072025 · Reddit Post
- https://twitter.com/HunterMapping/status/1942779106128715952 · Twitter Post
- https://twitter.com/DarkWebInformer/status/1942307581550072186 · Twitter Post
- https://twitter.com/transilienceai/status/1941344031142969732 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1lw8z1z/top_10_trending_cves_10072025 · Reddit Post
- https://t.me/cveNotify/131124 · Telegram Post
- https://t.me/cvenotify/127739 · Telegram Post
- https://twitter.com/VulmonFeeds/status/1941367047612518503 · Twitter Post
- https://twitter.com/CVEnew/status/1941269007744761957 · Twitter Post