We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-34140

ETQ Reliance CG/NXG API Authorization Bypass via ;localized-text URI Suffix



Description

An authorization bypass vulnerability exists in ETQ Reliance (legacy CG and NXG SaaS platforms). By appending a specific URI suffix to certain API endpoints, an unauthenticated attacker can bypass access control checks and retrieve limited sensitive resources. The root cause was a misconfiguration in API authorization logic, which has since been corrected in SE.2025.1 and 2025.1.2.

Reserved 2025-04-15 | Published 2025-07-22 | Updated 2025-07-22 | Assigner VulnCheck


HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-639 Authorization Bypass Through User-Controlled Key

Product status

Default status
unaffected

* before SE.2025.1
affected

* before 2025.1.2
unaffected

Default status
unaffected

* before SE.2025.1
affected

* before 2025.1.2
affected

Credits

Adam Kues and Shubham Shah of Assetnote finder

References

www.etq.com/product-overview/ product

www.etq.com/blog/etq-reliance-security-update/ vendor-advisory patch

cve.org (CVE-2025-34140)

nvd.nist.gov (CVE-2025-34140)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-34140

Support options

Helpdesk Chat, Email, Knowledgebase