Aikaan IoT management platform v3.25.0325-5-g2e9c59796 sends a newly generated password to users in plaintext via email and also includes the same password as a query parameter in the account activation URL (e.g., https://domain.com/activate=xyz). This practice can result in password exposure via browser history, proxy logs, referrer headers, and email caching. The vulnerability impacts user credential confidentiality during initial onboarding.
References
Configurations
No configuration.
History
22 Aug 2025, 18:08
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
21 Aug 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CWE | CWE-319 |
21 Aug 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-21 18:15
Updated : 2025-08-22 18:08
NVD link : CVE-2025-52351
Mitre link : CVE-2025-52351
CVE.ORG link : CVE-2025-52351
JSON object : View
Products Affected
No product.
CWE
CWE-319
Cleartext Transmission of Sensitive Information