CVE-2025-32440

NetAlertX is a network, presence scanner and alert framework. Prior to version 25.4.14, it is possible to bypass the authentication mechanism of NetAlertX to update settings without authentication. An attacker can trigger sensitive functions within util.php by sending crafted requests to /index.php. This issue has been patched in version 25.4.14.
Configurations

Configuration 1 (hide)

cpe:2.3:a:netalertx:netalertx:*:*:*:*:*:*:*:*

History

11 Jul 2025, 18:58

Type Values Removed Values Added
References () https://github.com/jokob-sk/NetAlertX/releases/tag/v25.4.14 - () https://github.com/jokob-sk/NetAlertX/releases/tag/v25.4.14 - Release Notes
References () https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-h4x5-vr54-vjrx - () https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-h4x5-vr54-vjrx - Vendor Advisory
CPE cpe:2.3:a:netalertx:netalertx:*:*:*:*:*:*:*:*
First Time Netalertx netalertx
Netalertx

28 May 2025, 14:15

Type Values Removed Values Added
References () https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-h4x5-vr54-vjrx - () https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-h4x5-vr54-vjrx -
Summary
  • (es) NetAlertX es un framework de trabajo de alertas, escáner de presencia y red. Antes de la versión 25.4.14, era posible eludir el mecanismo de autenticación de NetAlertX para actualizar la configuración sin autenticación. Un atacante puede activar funciones sensibles dentro de util.php enviando solicitudes manipuladas a /index.php. Este problema se ha corregido en la versión 25.4.14.

27 May 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-27 22:15

Updated : 2025-07-11 18:58


NVD link : CVE-2025-32440

Mitre link : CVE-2025-32440

CVE.ORG link : CVE-2025-32440


JSON object : View

Products Affected

netalertx

  • netalertx
CWE
CWE-306

Missing Authentication for Critical Function