CVE-2020-36968

M/Monit 3.7.4 contains an authentication vulnerability that allows authenticated attackers to retrieve user password hashes through an administrative API endpoint. Attackers can send requests to the /api/1/admin/users/list and /api/1/admin/users/get endpoints to extract MD5 password hashes for all users.
References
Link Resource
https://mmonit.com/ Product
https://www.exploit-db.com/exploits/49081 Exploit Third Party Advisory VDB Entry
https://www.vulncheck.com/advisories/mmonit-password-disclosure Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:tildeslash:m\/monit:3.7.4:*:*:*:*:*:*:*

History

03 Feb 2026, 15:42

Type Values Removed Values Added
CPE cpe:2.3:a:tildeslash:m\/monit:3.7.4:*:*:*:*:*:*:*
First Time Tildeslash m\/monit
Tildeslash
References () https://mmonit.com/ - () https://mmonit.com/ - Product
References () https://www.exploit-db.com/exploits/49081 - () https://www.exploit-db.com/exploits/49081 - Exploit, Third Party Advisory, VDB Entry
References () https://www.vulncheck.com/advisories/mmonit-password-disclosure - () https://www.vulncheck.com/advisories/mmonit-password-disclosure - Third Party Advisory

28 Jan 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-28 18:16

Updated : 2026-02-03 15:42


NVD link : CVE-2020-36968

Mitre link : CVE-2020-36968

CVE.ORG link : CVE-2020-36968


JSON object : View

Products Affected

tildeslash

  • m\/monit
CWE
CWE-522

Insufficiently Protected Credentials