Home

Description

A vulnerability was determined in TaleLin Lin-CMS up to 0.6.0. This affects an unknown part of the file /tests/config.py of the component Tests Folder. This manipulation of the argument username/password causes password in configuration file. The attack is possible to be carried out remotely. The complexity of an attack is rather high. It is indicated that the exploitability is difficult. The exploit has been publicly disclosed and may be utilized.

PUBLISHED Reserved 2025-12-27 | Published 2025-12-28 | Updated 2025-12-29 | Assigner VulDB




MEDIUM: 6.3CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
LOW: 3.7CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
LOW: 3.7CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
2.6AV:N/AC:H/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR

Problem types

Password in Configuration File

Credentials Management

Product status

0.1
affected

0.2
affected

0.3
affected

0.4
affected

0.5
affected

0.6.0
affected

Timeline

2025-12-27:Advisory disclosed
2025-12-27:VulDB entry created
2025-12-27:VulDB entry last update

Credits

m3x1 (VulDB User) reporter

References

vuldb.com/?id.338528 (VDB-338528 | TaleLin Lin-CMS Tests Folder config.py password in configuration file) vdb-entry technical-description

vuldb.com/?ctiid.338528 (VDB-338528 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.721893 (Submit #721893 | https://doc.cms.talelin.com/ Lin-CMS 0.6.0 weak password) third-party-advisory

github.com/...4020a4a642af4c50912f762937292228641/lin-cms.md exploit

cve.org (CVE-2025-15151)

nvd.nist.gov (CVE-2025-15151)

Download JSON