CVE-2025-48926

The admin panel in the TeleMessage service through 2025-05-05 allows attackers to discover usernames, e-mail addresses, passwords, and telephone numbers.
Configurations

Configuration 1 (hide)

cpe:2.3:a:smarsh:telemessage:*:*:*:*:*:*:*:*

History

22 Oct 2025, 15:02

Type Values Removed Values Added
First Time Smarsh telemessage
Smarsh
CPE cpe:2.3:a:smarsh:telemessage:*:*:*:*:*:*:*:*
References () https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/ - () https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/ - Press/Media Coverage

01 Jul 2025, 20:15

Type Values Removed Values Added
Summary
  • (es) El panel de administración del servicio TeleMessage, hasta el 5 de mayo de 2025, permite a los atacantes descubrir nombres de usuario, direcciones de correo electrónico, contraseñas y números de teléfono, tal como se explotó en mayo de 2025.
Summary (en) The admin panel in the TeleMessage service through 2025-05-05 allows attackers to discover usernames, e-mail addresses, passwords, and telephone numbers, as exploited in the wild in May 2025. (en) The admin panel in the TeleMessage service through 2025-05-05 allows attackers to discover usernames, e-mail addresses, passwords, and telephone numbers.

28 May 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-28 17:15

Updated : 2025-10-22 15:02


NVD link : CVE-2025-48926

Mitre link : CVE-2025-48926

CVE.ORG link : CVE-2025-48926


JSON object : View

Products Affected

smarsh

  • telemessage
CWE
CWE-288

Authentication Bypass Using an Alternate Path or Channel