Webkul QloApps v1.6.1 exposes authentication tokens in URLs during redirection. When users access the admin panel or other protected areas, the application appends sensitive authentication tokens directly to the URL.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/mano257200/QloApps-VUL | Exploit Third Party Advisory | 
Configurations
                    History
                    09 Jul 2025, 14:54
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/mano257200/QloApps-VUL - Exploit, Third Party Advisory | |
| CPE | cpe:2.3:a:webkul:qloapps:1.6.1:*:*:*:*:*:*:* | |
| First Time | Webkul Webkul qloapps | 
19 Feb 2025, 21:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 4.2 | 
| CWE | CWE-598 | |
| Summary | 
 | 
18 Feb 2025, 18:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-02-18 18:15
Updated : 2025-07-09 14:54
NVD link : CVE-2025-26058
Mitre link : CVE-2025-26058
CVE.ORG link : CVE-2025-26058
JSON object : View
Products Affected
                webkul
- qloapps
CWE
                
                    
                        
                        CWE-598
                        
            Use of GET Request Method With Sensitive Query Strings
