Home

Description

Aikaan IoT management platform v3.25.0325-5-g2e9c59796 sends a newly generated password to users in plaintext via email and also includes the same password as a query parameter in the account activation URL (e.g., https://domain.com/activate=xyz). This practice can result in password exposure via browser history, proxy logs, referrer headers, and email caching. The vulnerability impacts user credential confidentiality during initial onboarding.

PUBLISHED Reserved 2025-06-16 | Published 2025-08-21 | Updated 2025-08-21 | Assigner mitre

References

www.aikaan.io

github.com/...ies/blob/main/cve3-activation-link-password.md

cve.org (CVE-2025-52351)

nvd.nist.gov (CVE-2025-52351)

Download JSON