The CGM CLININET application does not implement any mechanisms that prevent clickjacking attacks, neither HTTP security headers nor HTML-based frame‑busting protections were detected. As a result, an attacker can embed the application inside a maliciously crafted IFRAME and trick users into performing unintended actions, including potentially bypassing CSRF/XSRF defenses.
References
| Link | Resource |
|---|---|
| https://cert.pl/en/posts/2026/03/CVE-2025-10350/ | Third Party Advisory |
| https://www.cgm.com/pol_pl/products/szpital/cgm-clininet.html | Product |
Configurations
History
09 Mar 2026, 15:19
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
| CPE | cpe:2.3:a:cgm:clininet:*:*:*:*:*:*:*:* | |
| First Time |
Cgm clininet
Cgm |
|
| References | () https://cert.pl/en/posts/2026/03/CVE-2025-10350/ - Third Party Advisory | |
| References | () https://www.cgm.com/pol_pl/products/szpital/cgm-clininet.html - Product |
02 Mar 2026, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-02 12:16
Updated : 2026-03-09 15:19
NVD link : CVE-2025-58405
Mitre link : CVE-2025-58405
CVE.ORG link : CVE-2025-58405
JSON object : View
Products Affected
cgm
- clininet
CWE
CWE-1021
Improper Restriction of Rendered UI Layers or Frames
