CVE-2025-55129

HackerOne community member Kassem S.(kassem_s94) has reported that username handling in Revive Adserver was still vulnerable to impersonation attacks after the fix for CVE-2025-52672, via several alternate techniques. Homoglyphs based impersonation has been independently reported by other HackerOne users, such as itz_hari_ and khoof.
References
Link Resource
https://hackerone.com/reports/3434156 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:aquaplatform:revive_adserver:*:*:*:*:*:*:*:*

History

30 Dec 2025, 14:31

Type Values Removed Values Added
References () https://hackerone.com/reports/3434156 - () https://hackerone.com/reports/3434156 - Exploit, Issue Tracking, Third Party Advisory
CPE cpe:2.3:a:aquaplatform:revive_adserver:*:*:*:*:*:*:*:*
First Time Aquaplatform
Aquaplatform revive Adserver

02 Dec 2025, 19:15

Type Values Removed Values Added
CWE CWE-176

02 Dec 2025, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-02 02:15

Updated : 2025-12-30 14:31


NVD link : CVE-2025-55129

Mitre link : CVE-2025-55129

CVE.ORG link : CVE-2025-55129


JSON object : View

Products Affected

aquaplatform

  • revive_adserver
CWE
CWE-176

Improper Handling of Unicode Encoding