No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://pastebin.com/Tk4LgMG2 |
|
| https://www.sagedpw.at/ |
|
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unauthenticated Access to Diagnostic Endpoints in Sage DPW | |
| First Time appeared |
Sage
Sage dpw |
|
| Weaknesses | CWE-200 CWE-284 |
|
| Vendors & Products |
Sage
Sage dpw |
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A non-default configuration in Sage DPW 2025_06_004 allows unauthenticated access to diagnostic endpoints within the Database Monitor feature, exposing sensitive information such as hashes and table names. This feature is disabled by default in all installations and never available in Sage DPW Cloud. It was forcibly disabled again in version 2025_06_003. | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-01T15:57:39.349Z
Reserved: 2025-12-12T00:00:00.000Z
Link: CVE-2025-67805
Updated: 2026-04-01T15:57:33.979Z
Status : Received
Published: 2026-04-01T16:23:48.177
Modified: 2026-04-01T16:23:48.177
Link: CVE-2025-67805
No data.
OpenCVE Enrichment
Updated: 2026-04-02T20:09:55Z