An unauthenticated remote attacker can obtain valid session tokens because they are exposed in plaintext within the URL parameters of the wwwupdate.cgi endpoint in UBR.
References
History

Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Mbs
Mbs ubr-01 Mk Ii
Mbs ubr-02
Mbs ubr-lon
Vendors & Products Mbs
Mbs ubr-01 Mk Ii
Mbs ubr-02
Mbs ubr-lon

Mon, 09 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 08:30:00 +0000

Type Values Removed Values Added
Description An unauthenticated remote attacker can obtain valid session tokens because they are exposed in plaintext within the URL parameters of the wwwupdate.cgi endpoint in UBR.
Title wwwupdate.cgi Session token in URL
Weaknesses CWE-598
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published: 2026-03-09T08:18:49.918Z

Updated: 2026-03-09T18:18:41.648Z

Reserved: 2025-04-16T11:18:45.761Z

Link: CVE-2025-41772

cve-icon Vulnrichment

Updated: 2026-03-09T18:18:29.921Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-09T09:16:01.537

Modified: 2026-03-09T13:35:07.393

Link: CVE-2025-41772

cve-icon Redhat

No data.