CVE-2025-15106

A weakness has been identified in getmaxun maxun up to 0.0.28. The affected element is the function router.get of the file server/src/routes/auth.ts of the component Authentication Endpoint. Executing manipulation can lead to improper authorization. The attack can be executed remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://gist.github.com/H2u8s/1a0bdb19d5c8c8f4dc72cb49ffe9a22b Exploit
https://vuldb.com/?ctiid.338477 Permissions Required VDB Entry
https://vuldb.com/?id.338477 Third Party Advisory VDB Entry
https://vuldb.com/?submit.710268 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:maxun:maxun:*:*:*:*:*:*:*:*

History

31 Dec 2025, 19:23

Type Values Removed Values Added
First Time Maxun
Maxun maxun
CPE cpe:2.3:a:maxun:maxun:*:*:*:*:*:*:*:*
CWE CWE-639
References () https://gist.github.com/H2u8s/1a0bdb19d5c8c8f4dc72cb49ffe9a22b - () https://gist.github.com/H2u8s/1a0bdb19d5c8c8f4dc72cb49ffe9a22b - Exploit
References () https://vuldb.com/?ctiid.338477 - () https://vuldb.com/?ctiid.338477 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.338477 - () https://vuldb.com/?id.338477 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.710268 - () https://vuldb.com/?submit.710268 - Third Party Advisory, VDB Entry

27 Dec 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-27 11:15

Updated : 2025-12-31 19:23


NVD link : CVE-2025-15106

Mitre link : CVE-2025-15106

CVE.ORG link : CVE-2025-15106


JSON object : View

Products Affected

maxun

  • maxun
CWE
CWE-266

Incorrect Privilege Assignment

CWE-285

Improper Authorization

CWE-639

Authorization Bypass Through User-Controlled Key