Home

Description

M/Monit 3.7.4 contains an authentication vulnerability that allows authenticated attackers to retrieve user password hashes through an administrative API endpoint. Attackers can send requests to the /api/1/admin/users/list and /api/1/admin/users/get endpoints to extract MD5 password hashes for all users.

PUBLISHED Reserved 2026-01-27 | Published 2026-01-28 | Updated 2026-01-29 | Assigner VulnCheck




HIGH: 7.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

Insufficiently Protected Credentials

Product status

3.7.4
affected

Credits

Dolev Farhi finder

References

www.exploit-db.com/exploits/49081 (ExploitDB-49081) exploit

mmonit.com/ (M/Monit Official Vendor Homepage) product

www.vulncheck.com/advisories/mmonit-password-disclosure (VulnCheck Advisory: M/Monit 3.7.4 - Password Disclosure) third-party-advisory

cve.org (CVE-2020-36968)

nvd.nist.gov (CVE-2020-36968)

Download JSON