The backup ZIPs are not signed by the application, leading to the possibility that an attacker can download a backup ZIP, modify and re-upload it. This allows the attacker to disrupt the application by configuring  the  services  in  a  way  that  they  are  unable  to  run,  making  the  application unusable. They can redirect traffic that is meant to be internal to their own hosted services and gathering information.
                
            References
                    Configurations
                    No configuration.
History
                    12 Jun 2025, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-06-12 15:15
Updated : 2025-06-12 16:06
NVD link : CVE-2025-49199
Mitre link : CVE-2025-49199
CVE.ORG link : CVE-2025-49199
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-345
                        
            Insufficient Verification of Data Authenticity
