CVE-2025-48928

The TeleMessage service through 2025-05-05 is based on a JSP application in which the heap content is roughly equivalent to a "core dump" in which a password previously sent over HTTP would be included in this dump, as exploited in the wild in May 2025.
Configurations

Configuration 1 (hide)

cpe:2.3:a:smarsh:telemessage:-:*:*:*:*:*:*:*

History

02 Jul 2025, 17:55

Type Values Removed Values Added
CWE CWE-552
CPE cpe:2.3:a:smarsh:telemessage:-:*:*:*:*:*:*:*
References () https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/ - () https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/ - Press/Media Coverage
First Time Smarsh
Smarsh telemessage

02 Jul 2025, 01:00

Type Values Removed Values Added
Summary
  • (es) El servicio TeleMessage hasta el 5 de mayo de 2025 se basa en una aplicación JSP en la que el contenido del montón es aproximadamente equivalente a un "volcado de núcleo" en el que se incluiría una contraseña enviada previamente a través de HTTP, como se explotó en la naturaleza en mayo de 2025.

28 May 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-28 17:15

Updated : 2025-07-02 17:55


NVD link : CVE-2025-48928

Mitre link : CVE-2025-48928

CVE.ORG link : CVE-2025-48928


JSON object : View

Products Affected

smarsh

  • telemessage
CWE
CWE-528

Exposure of Core Dump File to an Unauthorized Control Sphere

CWE-552

Files or Directories Accessible to External Parties