CVE-2025-57430

Creacast Creabox Manager 4.4.4 exposes sensitive configuration data via a publicly accessible endpoint /get. When accessed, this endpoint returns internal configuration including the creacodec.lua file, which contains plaintext admin credentials.
Configurations

Configuration 1 (hide)

cpe:2.3:a:creacast:creabox_manager:4.4.4:*:*:*:*:*:*:*

History

14 Oct 2025, 19:57

Type Values Removed Values Added
First Time Creacast creabox Manager
Creacast
CPE cpe:2.3:a:creacast:creabox_manager:4.4.4:*:*:*:*:*:*:*
References () http://www.creacast.com/ - () http://www.creacast.com/ - Product
References () https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57430 - () https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57430 - Exploit, Third Party Advisory

23 Sep 2025, 19:15

Type Values Removed Values Added
References () https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57430 - () https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57430 -
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE CWE-200

22 Sep 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-22 16:15

Updated : 2025-10-14 19:57


NVD link : CVE-2025-57430

Mitre link : CVE-2025-57430

CVE.ORG link : CVE-2025-57430


JSON object : View

Products Affected

creacast

  • creabox_manager
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor