Home

Description

PimpMyLog 1.7.14 contains an improper access control vulnerability that allows remote attackers to create admin accounts without authorization through the configuration endpoint. Attackers can exploit the unsanitized username field to inject malicious JavaScript, create a hidden backdoor account, and potentially access sensitive server-side log information and environmental variables.

PUBLISHED Reserved 2025-12-16 | Published 2025-12-16 | Updated 2025-12-18 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

Improper Authorization

Product status

Default status
unaffected

1.7.14
affected

Credits

thoughtfault finder

References

www.exploit-db.com/exploits/51593 (ExploitDB-51593) exploit

www.pimpmylog.com/ (Pimp My Log Product Webpage) product

github.com/potsky/PimpMyLog (Pimp My Log GitHub Repository) product

www.vulncheck.com/...s-control-via-account-creation-endpoint (VulnCheck Advisory: PimpMyLog 1.7.14 Improper Access Control via Account Creation Endpoint) third-party-advisory

cve.org (CVE-2023-53895)

nvd.nist.gov (CVE-2023-53895)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.