Vulnerabilities (CVE)

Filtered by CWE-598
Total 56 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-26058 1 Webkul 1 Qloapps 2025-07-09 N/A 4.2 MEDIUM
Webkul QloApps v1.6.1 exposes authentication tokens in URLs during redirection. When users access the admin panel or other protected areas, the application appends sensitive authentication tokens directly to the URL.
CVE-2025-3637 1 Moodle 1 Moodle 2025-06-24 N/A 3.1 LOW
A security vulnerability was found in Moodle where confidential information that prevents cross-site request forgery (CSRF) attacks was shared publicly through the site's URL. This vulnerability occurred specifically on two types of pages within the mod_data module: edit and delete pages.
CVE-2025-3943 4 Blackberry, Linux, Microsoft and 1 more 5 Qnx, Linux Kernel, Windows and 2 more 2025-06-04 N/A 4.1 MEDIUM
Use of GET Request Method With Sensitive Query Strings vulnerability in Tridium Niagara Framework on Windows, Linux, QNX, Tridium Niagara Enterprise Security on Windows, Linux, QNX allows Parameter Injection. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11. Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11.
CVE-2023-45716 1 Hcltech 1 Sametime 2025-06-03 N/A 1.7 LOW
Sametime is impacted by sensitive information passed in URL.
CVE-2025-22387 1 Optimizely 1 Configured Commerce 2025-05-21 N/A 7.5 HIGH
An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity issue exists in requests for resources where the session token is submitted as a URL parameter. This exposes information about the authenticated session, which can be leveraged for session hijacking.
CVE-2025-32021 1 Weblate 1 Weblate 2025-04-30 N/A 2.2 LOW
Weblate is a web based localization tool. Prior to version 5.11, when creating a new component from an existing component that has a source code repository URL specified in settings, this URL is included in the client's URL parameters during the creation process. If, for example, the source code repository URL contains GitHub credentials, the confidential PAT and username are shown in plaintext and get saved into browser history. Moreover, if the request URL is logged, the credentials are written to logs in plaintext. If using Weblate official Docker image, nginx logs the URL and the token in plaintext. This issue is patched in version 5.11.
CVE-2025-24948 1 Joturl 1 Joturl 2025-04-22 N/A 6.5 MEDIUM
In JotUrl 2.0, passwords are sent via HTTP GET-type requests, potentially exposing credentials to eavesdropping or insecure records.
CVE-2025-26473 1 Outbackpower 2 Mojave Inverter Oghi8048a, Mojave Inverter Oghi8048a Firmware 2025-03-19 N/A 7.5 HIGH
The Mojave Inverter uses the GET method for sensitive information.
CVE-2024-2745 1 Rapid7 1 Insightvm 2025-02-25 N/A 3.3 LOW
Rapid7's InsightVM maintenance mode login page suffers from a sensitive information exposure vulnerability whereby, sensitive information is exposed through query strings in the URL when login is attempted before the page is fully loaded.  This vulnerability allows attackers to acquire sensitive information such as passwords, auth tokens, usernames etc.     The vulnerability is remediated in version 6.6.244. 
CVE-2023-32335 1 Ibm 2 Maximo Application Suite, Maximo Asset Management 2025-01-14 N/A 3.7 LOW
IBM Maximo Application Suite 8.10, 8.11 and IBM Maximo Asset Management 7.6.1.3 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 255075.
CVE-2024-28238 1 Monospace 1 Directus 2025-01-03 N/A 2.3 LOW
Directus is a real-time API and App dashboard for managing SQL database content. When reaching the /files page, a JWT is passed via GET request. Inclusion of session tokens in URLs poses a security risk as URLs are often logged in various places (e.g., web server logs, browser history). Attackers gaining access to these logs may hijack active user sessions, leading to unauthorized access to sensitive information or actions on behalf of the user. This issue has been addressed in version 10.10.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2023-6287 1 Tribe29 1 Checkmk Appliance Firmware 2024-11-21 N/A 3.3 LOW
Sensitive data exposure in Webconf in Tribe29 Checkmk Appliance before 1.6.8 allows local attacker to retrieve passwords via reading log files.
CVE-2023-50954 1 Ibm 1 Infosphere Information Server 2024-11-21 N/A 4.3 MEDIUM
IBM InfoSphere Information Server 11.7 returns sensitive information in URL information that could be used in further attacks against the system. IBM X-Force ID: 275776.
CVE-2021-21594 1 Dell 1 Emc Powerscale Onefs 2024-11-21 5.0 MEDIUM 8.2 HIGH
Dell PowerScale OneFS versions 8.2.2 - 9.1.0.x contain a use of get request method with sensitive query strings vulnerability. It can lead to potential disclosure of sensitive data. Dell recommends upgrading at your earliest opportunity.
CVE-2024-41738 1 Ibm 1 Txseries For Multiplatforms 2024-11-14 N/A 5.9 MEDIUM
IBM TXSeries for Multiplatforms 10.1 could allow an attacker to obtain sensitive information from the query string of an HTTP GET method to process a request which could be obtained using man in the middle techniques.
CVE-2024-32931 1 Johnsoncontrols 1 Exacqvision Web Service 2024-08-09 N/A 5.7 MEDIUM
Under certain circumstances the exacqVision Web Service can expose authentication token details within communications.