The CGM CLININET application respond without essential security HTTP headers, exposing users to client‑side attacks such as clickjacking, MIME sniffing, unsafe caching, weak cross‑origin isolation, and missing transport security controls.
References
| Link | Resource |
|---|---|
| https://cert.pl/en/posts/2026/03/CVE-2025-10350/ | Third Party Advisory |
| https://www.cgm.com/pol_pl/products/szpital/cgm-clininet.html | Product |
Configurations
History
09 Mar 2026, 15:11
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:cgm:clininet:*:*:*:*:*:*:*:* | |
| First Time |
Cgm clininet
Cgm |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
| References | () https://cert.pl/en/posts/2026/03/CVE-2025-10350/ - Third Party Advisory | |
| References | () https://www.cgm.com/pol_pl/products/szpital/cgm-clininet.html - Product |
02 Mar 2026, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-02 12:16
Updated : 2026-03-09 15:11
NVD link : CVE-2025-58406
Mitre link : CVE-2025-58406
CVE.ORG link : CVE-2025-58406
JSON object : View
Products Affected
cgm
- clininet
CWE
CWE-693
Protection Mechanism Failure
