An unauthenticated adjacent attacker can modify...
High severity
Unreviewed
Published
Jul 8, 2025
to the GitHub Advisory Database
•
Updated Jul 8, 2025
Description
Published by the National Vulnerability Database
Jul 8, 2025
Published to the GitHub Advisory Database
Jul 8, 2025
Last updated
Jul 8, 2025
An unauthenticated adjacent attacker can modify configuration by sending specific requests to an API-endpoint resulting in read and write access due to missing authentication.
References