<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Newest Web App Scanning Plugins from Tenable</title>
        <link>https://www.tenable.com/plugins/feeds?sort=newest&amp;type=was</link>
        <description>Get the latest plugin updates from Tenable</description>
        <lastBuildDate>Tue, 17 Mar 2026 09:38:01 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>Tenable Plugins</generator>
        <image>
            <title>Newest Web App Scanning Plugins from Tenable</title>
            <url>https://www.tenable.com/themes/custom/tenable/img/favicons/apple-touch-icon.png</url>
            <link>https://www.tenable.com/plugins/feeds?sort=newest&amp;type=was</link>
        </image>
        <copyright>Copyright 2026 Tenable, Inc. All rights reserved.</copyright>
        <atom:link href="https://www.tenable.com/plugins/feeds?sort=newest&amp;type=was" rel="self" type="application/rss+xml"/>
        <item>
            <title><![CDATA[WordPress 6.4.x < 6.4.8 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115170</link>
            <guid>https://www.tenable.com/plugins/was/115170</guid>
            <pubDate>Thu, 12 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115170 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 6.4.x < 6.4.8 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A blind Server-Side Request Forgery (SSRF)<br /></span><span><br /></span><span> - A PoP-chain weakness in the HTML API and Block Registry<br /></span><span><br /></span><span> - A regex Denial of Service (DoS) weakness in numeric character references<br /></span><span><br /></span><span> - A stored Cross-Site Scripting (XSS) in nav menus<br /></span><span><br /></span><span> - An AJAX query-attachments authorization bypass<br /></span><span><br /></span><span> - A stored Cross-Site Scripting (XSS) via the data-wp-bind directive<br /></span><span><br /></span><span> - An Cross-Site Scripting (XSS) that allows overridding client-side templates in the admin area<br /></span><span><br /></span><span> - A PclZip path traversal issue<br /></span><span><br /></span><span> - An authorization bypass on the Notes feature<br /></span><span><br /></span><span> - An XML External Entity (XXE) issue in the external getID3 library<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 6.4.8 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115170">https://www.tenable.com/plugins/was/115170</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 6.5.x < 6.5.8 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115169</link>
            <guid>https://www.tenable.com/plugins/was/115169</guid>
            <pubDate>Thu, 12 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115169 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 6.5.x < 6.5.8 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A blind Server-Side Request Forgery (SSRF)<br /></span><span><br /></span><span> - A PoP-chain weakness in the HTML API and Block Registry<br /></span><span><br /></span><span> - A regex Denial of Service (DoS) weakness in numeric character references<br /></span><span><br /></span><span> - A stored Cross-Site Scripting (XSS) in nav menus<br /></span><span><br /></span><span> - An AJAX query-attachments authorization bypass<br /></span><span><br /></span><span> - A stored Cross-Site Scripting (XSS) via the data-wp-bind directive<br /></span><span><br /></span><span> - An Cross-Site Scripting (XSS) that allows overridding client-side templates in the admin area<br /></span><span><br /></span><span> - A PclZip path traversal issue<br /></span><span><br /></span><span> - An authorization bypass on the Notes feature<br /></span><span><br /></span><span> - An XML External Entity (XXE) issue in the external getID3 library<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 6.5.8 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115169">https://www.tenable.com/plugins/was/115169</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 6.6.x < 6.6.5 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115168</link>
            <guid>https://www.tenable.com/plugins/was/115168</guid>
            <pubDate>Thu, 12 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115168 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 6.6.x < 6.6.5 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A blind Server-Side Request Forgery (SSRF)<br /></span><span><br /></span><span> - A PoP-chain weakness in the HTML API and Block Registry<br /></span><span><br /></span><span> - A regex Denial of Service (DoS) weakness in numeric character references<br /></span><span><br /></span><span> - A stored Cross-Site Scripting (XSS) in nav menus<br /></span><span><br /></span><span> - An AJAX query-attachments authorization bypass<br /></span><span><br /></span><span> - A stored Cross-Site Scripting (XSS) via the data-wp-bind directive<br /></span><span><br /></span><span> - An Cross-Site Scripting (XSS) that allows overridding client-side templates in the admin area<br /></span><span><br /></span><span> - A PclZip path traversal issue<br /></span><span><br /></span><span> - An authorization bypass on the Notes feature<br /></span><span><br /></span><span> - An XML External Entity (XXE) issue in the external getID3 library<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 6.6.5 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115168">https://www.tenable.com/plugins/was/115168</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 6.7.x < 6.7.5 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115167</link>
            <guid>https://www.tenable.com/plugins/was/115167</guid>
            <pubDate>Thu, 12 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115167 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 6.7.x < 6.7.5 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A blind Server-Side Request Forgery (SSRF)<br /></span><span><br /></span><span> - A PoP-chain weakness in the HTML API and Block Registry<br /></span><span><br /></span><span> - A regex Denial of Service (DoS) weakness in numeric character references<br /></span><span><br /></span><span> - A stored Cross-Site Scripting (XSS) in nav menus<br /></span><span><br /></span><span> - An AJAX query-attachments authorization bypass<br /></span><span><br /></span><span> - A stored Cross-Site Scripting (XSS) via the data-wp-bind directive<br /></span><span><br /></span><span> - An Cross-Site Scripting (XSS) that allows overridding client-side templates in the admin area<br /></span><span><br /></span><span> - A PclZip path traversal issue<br /></span><span><br /></span><span> - An authorization bypass on the Notes feature<br /></span><span><br /></span><span> - An XML External Entity (XXE) issue in the external getID3 library<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 6.7.5 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115167">https://www.tenable.com/plugins/was/115167</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 6.8.x < 6.8.5 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115166</link>
            <guid>https://www.tenable.com/plugins/was/115166</guid>
            <pubDate>Thu, 12 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115166 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 6.8.x < 6.8.5 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A blind Server-Side Request Forgery (SSRF)<br /></span><span><br /></span><span> - A PoP-chain weakness in the HTML API and Block Registry<br /></span><span><br /></span><span> - A regex Denial of Service (DoS) weakness in numeric character references<br /></span><span><br /></span><span> - A stored Cross-Site Scripting (XSS) in nav menus<br /></span><span><br /></span><span> - An AJAX query-attachments authorization bypass<br /></span><span><br /></span><span> - A stored Cross-Site Scripting (XSS) via the data-wp-bind directive<br /></span><span><br /></span><span> - An Cross-Site Scripting (XSS) that allows overridding client-side templates in the admin area<br /></span><span><br /></span><span> - A PclZip path traversal issue<br /></span><span><br /></span><span> - An authorization bypass on the Notes feature<br /></span><span><br /></span><span> - An XML External Entity (XXE) issue in the external getID3 library<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 6.8.5 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115166">https://www.tenable.com/plugins/was/115166</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 6.9.x < 6.9.2 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115165</link>
            <guid>https://www.tenable.com/plugins/was/115165</guid>
            <pubDate>Thu, 12 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115165 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 6.9.x < 6.9.2 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A blind Server-Side Request Forgery (SSRF)<br /></span><span><br /></span><span> - A PoP-chain weakness in the HTML API and Block Registry<br /></span><span><br /></span><span> - A regex Denial of Service (DoS) weakness in numeric character references<br /></span><span><br /></span><span> - A stored Cross-Site Scripting (XSS) in nav menus<br /></span><span><br /></span><span> - An AJAX query-attachments authorization bypass<br /></span><span><br /></span><span> - A stored Cross-Site Scripting (XSS) via the data-wp-bind directive<br /></span><span><br /></span><span> - An Cross-Site Scripting (XSS) that allows overridding client-side templates in the admin area<br /></span><span><br /></span><span> - A PclZip path traversal issue<br /></span><span><br /></span><span> - An authorization bypass on the Notes feature<br /></span><span><br /></span><span> - An XML External Entity (XXE) issue in the external getID3 library<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 6.9.2 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115165">https://www.tenable.com/plugins/was/115165</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[CKEditor < 43.1.1 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/115164</link>
            <guid>https://www.tenable.com/plugins/was/115164</guid>
            <pubDate>Tue, 10 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115164 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>CKEditor < 43.1.1 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the CKEditor application running on the remote host is 5.40.x prior to 5.41.3.2 or 5.43.1.x prior to 5.43.1.1. It is, therefore, affected by a Cross-Site Scripting (XSS) vulnerability in the CKEditor 5 clipboard package.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to CKEditor version 5.43.1.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115164">https://www.tenable.com/plugins/was/115164</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[CKEditor 5.40.0.x < 5.41.3.2 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/115163</link>
            <guid>https://www.tenable.com/plugins/was/115163</guid>
            <pubDate>Tue, 10 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115163 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>CKEditor 5.40.0.x < 5.41.3.2 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the CKEditor application running on the remote host is 5.40.x prior to 5.41.3.2 or 5.43.1.x prior to 5.43.1.1. It is, therefore, affected by a Cross-Site Scripting (XSS) vulnerability in the CKEditor 5 clipboard package.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to CKEditor version 5.41.3.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115163">https://www.tenable.com/plugins/was/115163</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[CKEditor 5.42.0.x < 5.44.2.1 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/115162</link>
            <guid>https://www.tenable.com/plugins/was/115162</guid>
            <pubDate>Tue, 10 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115162 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>CKEditor 5.42.0.x < 5.44.2.1 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the CKEditor application running on the remote host is 5.44.2.x prior to 5.44.2.1. It is, therefore, affected by a Cross-Site Scripting (XSS) vulnerability in the CKEditor 5 real-time collaboration package.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to CKEditor version 5.44.2.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115162">https://www.tenable.com/plugins/was/115162</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[CKEditor 5.46.0.2 < 5.46.0.3 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/115161</link>
            <guid>https://www.tenable.com/plugins/was/115161</guid>
            <pubDate>Tue, 10 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115161 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>CKEditor 5.46.0.2 < 5.46.0.3 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the CKEditor application running on the remote host is 5.44.2.x prior to 5.45.2.2 or 5.46.0.2 prior to 5.46.0.3. It is, therefore, affected by a Cross-Site Scripting (XSS) vulnerability in the CKEditor 5 clipboard package.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to CKEditor version 5.46.0.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115161">https://www.tenable.com/plugins/was/115161</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[CKEditor 5.44.2.x < 5.45.2.2 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/115160</link>
            <guid>https://www.tenable.com/plugins/was/115160</guid>
            <pubDate>Tue, 10 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115160 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>CKEditor 5.44.2.x < 5.45.2.2 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the CKEditor application running on the remote host is 5.44.2.x prior to 5.45.2.2 or 5.46.0.2 prior to 5.46.0.3. It is, therefore, affected by a Cross-Site Scripting (XSS) vulnerability in the CKEditor 5 clipboard package.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to CKEditor version 5.45.2.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115160">https://www.tenable.com/plugins/was/115160</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[CKEditor < 47.6.0 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/115159</link>
            <guid>https://www.tenable.com/plugins/was/115159</guid>
            <pubDate>Tue, 10 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115159 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>CKEditor < 47.6.0 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the CKEditor application running on the remote host is prior to 47.6.0. It is, therefore, affected by a Cross-Site Scripting (XSS) vulnerability in the General HTML Support feature.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to CKEditor version 47.6.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115159">https://www.tenable.com/plugins/was/115159</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Nginx UI < 2.3.3 Sensitive Information Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/115158</link>
            <guid>https://www.tenable.com/plugins/was/115158</guid>
            <pubDate>Tue, 10 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115158 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Nginx UI < 2.3.3 Sensitive Information Disclosure<br /></span>
      <h3>Description</h3>
      <span>Nginx UI version below 2.3.3 contains a critical sensitive information disclosure vulnerability that allows unauthenticated attackers to access the /api/backup endpoint and retrieve encryption keys from the X-Backup-Security response header. This enables attackers to download and decrypt full system backups, exposing sensitive data such as user credentials, session tokens, SSL private keys, and Nginx configurations.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Nginx UI version 2.3.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115158">https://www.tenable.com/plugins/was/115158</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Validated Secret Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115118</link>
            <guid>https://www.tenable.com/plugins/was/115118</guid>
            <pubDate>Tue, 10 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115118 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Validated Secret Detected<br /></span>
      <h3>Description</h3>
      <span>The scanner identified a hard-coded secret within the web application and validated that it is active and exploitable, allowing an attacker to authenticate to the associated service, access sensitive data, or perform unauthorized actions.<br /></span><span><br /></span><span>Secrets such as API keys, access tokens, and service credentials are often inadvertently exposed in client-side JavaScript, HTML comments, configuration files, or application responses.<br /></span><span><br /></span><span>Immediate action is required to revoke and rotate the exposed secret.<br /></span>
      <h3>Solution</h3>
      <span>Remove the secret exposure by identifying the root cause of the issue (for example manual data insertion in the code, environment variables being bundled in front-end JavaScript). Rotate the secrets to avoid further reuse in case it has been previously retrieved by a malicious actor.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115118">https://www.tenable.com/plugins/was/115118</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SolarWinds WHD < 2026.1 Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/115157</link>
            <guid>https://www.tenable.com/plugins/was/115157</guid>
            <pubDate>Thu, 05 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115157 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>SolarWinds WHD < 2026.1 Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>SolarWinds WHD version prior to 2026.1 contains a critical authentication bypass vulnerability that allows unauthenticated attackers to gain unauthorized access to the system, potentially leading to data breaches and system compromise.<br /></span>
      <h3>Solution</h3>
      <span>Apply the available 12.8.8 Hotfix 1 or upgrade to SolarWinds WHD version 2026.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115157">https://www.tenable.com/plugins/was/115157</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SolarWinds WHD < 2026.1 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115156</link>
            <guid>https://www.tenable.com/plugins/was/115156</guid>
            <pubDate>Thu, 05 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115156 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>SolarWinds WHD < 2026.1 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of SolarWinds WHD installed on the remote host is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A Security Control Bypass that could allow an unauthenticated attacker to gain access to certain restricted functionality (CVE-2025-40536)<br /></span><span><br /></span><span> - An Unauthenticated JNDI Injection that allow remote unauthenticated attackers can exploit JNDI injection via the Apache Xalan JNDIConnectionPool class to achieve remote code execution (CVE-2025-40551)<br /></span><span><br /></span><span> - An Authentication Bypass that allow remote unauthenticated attackers to execute protected actions without authentication (CVE-2025-40552)<br /></span><span><br /></span><span> - An Authentication Bypass that allow a remote unauthenticated attacker to access to privileged administrative functions (CVE-2025-40554)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Apply the available 12.8.8 Hotfix 1 or upgrade to SolarWinds WHD version 2026.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115156">https://www.tenable.com/plugins/was/115156</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[TLS 1.3 Not Supported Protocol]]></title>
            <link>https://www.tenable.com/plugins/was/115155</link>
            <guid>https://www.tenable.com/plugins/was/115155</guid>
            <pubDate>Thu, 05 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115155 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>TLS 1.3 Not Supported Protocol<br /></span>
      <h3>Description</h3>
      <span>The remote server does not offer TLS 1.3 protocol which is required to provide good encryption security.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115155">https://www.tenable.com/plugins/was/115155</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 9.0.0-M1 < 9.0.113 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115154</link>
            <guid>https://www.tenable.com/plugins/was/115154</guid>
            <pubDate>Thu, 05 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115154 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 9.0.0-M1 < 9.0.113 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.113, 10.1.0-M1 prior to 10.1.50 or 11.0.0-M1 prior to 11.0.15. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - If a security constraint was configured to allow HEAD requests to a URI but deny GET requests, the user could bypass that constraint on GET requests by sending a (specification invalid) HEAD request using HTTP/0.9. (CVE-2026-24733)<br /></span><span><br /></span><span> - If Tomcat was configured with more than one virtual host and the TLS configuration for one of those hosts did not require client certificate authentication but another one did, it was possible for a client to bypass the client certificate authentication by sending different host names in the SNI extension and the HTTP host header field. (CVE-2025-66614)<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.113 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115154">https://www.tenable.com/plugins/was/115154</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 10.1.0-M1 < 10.1.50 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115153</link>
            <guid>https://www.tenable.com/plugins/was/115153</guid>
            <pubDate>Thu, 05 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115153 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 10.1.0-M1 < 10.1.50 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.113, 10.1.0-M1 prior to 10.1.50 or 11.0.0-M1 prior to 11.0.15. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - If a security constraint was configured to allow HEAD requests to a URI but deny GET requests, the user could bypass that constraint on GET requests by sending a (specification invalid) HEAD request using HTTP/0.9. (CVE-2026-24733)<br /></span><span><br /></span><span> - If Tomcat was configured with more than one virtual host and the TLS configuration for one of those hosts did not require client certificate authentication but another one did, it was possible for a client to bypass the client certificate authentication by sending different host names in the SNI extension and the HTTP host header field. (CVE-2025-66614)<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.50 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115153">https://www.tenable.com/plugins/was/115153</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 11.0.0-M1 < 11.0.15 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115152</link>
            <guid>https://www.tenable.com/plugins/was/115152</guid>
            <pubDate>Thu, 05 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115152 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 11.0.0-M1 < 11.0.15 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.113, 10.1.0-M1 prior to 10.1.50 or 11.0.0-M1 prior to 11.0.15. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - If a security constraint was configured to allow HEAD requests to a URI but deny GET requests, the user could bypass that constraint on GET requests by sending a (specification invalid) HEAD request using HTTP/0.9. (CVE-2026-24733)<br /></span><span><br /></span><span> - If Tomcat was configured with more than one virtual host and the TLS configuration for one of those hosts did not require client certificate authentication but another one did, it was possible for a client to bypass the client certificate authentication by sending different host names in the SNI extension and the HTTP host header field. (CVE-2025-66614)<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 11.0.15 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115152">https://www.tenable.com/plugins/was/115152</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 9.0.83 < 9.0.115 Incomplete OCSP Verification Checks]]></title>
            <link>https://www.tenable.com/plugins/was/115151</link>
            <guid>https://www.tenable.com/plugins/was/115151</guid>
            <pubDate>Thu, 05 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115151 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 9.0.83 < 9.0.115 Incomplete OCSP Verification Checks<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.83 prior to 9.0.115, 10.1.0-M7 prior to 10.1.52 or 11.0.0-M1 prior to 11.0.18. It is, therefore, affected by a incomplete OCSP verification checks. When using an OCSP responder, Tomcat's FFM integration with OpenSSL did not complete verification or freshness checks on the OCSP response which could allow certificate revocation to be bypassed.<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.115 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115151">https://www.tenable.com/plugins/was/115151</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 10.1.0-M7 < 10.1.52 Incomplete OCSP Verification Checks]]></title>
            <link>https://www.tenable.com/plugins/was/115150</link>
            <guid>https://www.tenable.com/plugins/was/115150</guid>
            <pubDate>Thu, 05 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115150 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 10.1.0-M7 < 10.1.52 Incomplete OCSP Verification Checks<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.83 prior to 9.0.115, 10.1.0-M7 prior to 10.1.52 or 11.0.0-M1 prior to 11.0.18. It is, therefore, affected by a incomplete OCSP verification checks. When using an OCSP responder, Tomcat's FFM integration with OpenSSL did not complete verification or freshness checks on the OCSP response which could allow certificate revocation to be bypassed.<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.52 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115150">https://www.tenable.com/plugins/was/115150</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 11.0.0-M1 < 11.0.18 Incomplete OCSP Verification Checks]]></title>
            <link>https://www.tenable.com/plugins/was/115149</link>
            <guid>https://www.tenable.com/plugins/was/115149</guid>
            <pubDate>Thu, 05 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115149 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 11.0.0-M1 < 11.0.18 Incomplete OCSP Verification Checks<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.83 prior to 9.0.115, 10.1.0-M7 prior to 10.1.52 or 11.0.0-M1 prior to 11.0.18. It is, therefore, affected by a incomplete OCSP verification checks. When using an OCSP responder, Tomcat's FFM integration with OpenSSL did not complete verification or freshness checks on the OCSP response which could allow certificate revocation to be bypassed.<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 11.0.18 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115149">https://www.tenable.com/plugins/was/115149</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Git Credentials Configuration File Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115148</link>
            <guid>https://www.tenable.com/plugins/was/115148</guid>
            <pubDate>Tue, 17 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115148 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Git Credentials Configuration File Detected<br /></span>
      <h3>Description</h3>
      <span>A Git Credentials configuration file have been detected on the target web application. These files may contain sensitive information which could assist an attack to conduct further attacks.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to the config file or locate it outside the public webroot where possible.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115148">https://www.tenable.com/plugins/was/115148</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Configuration File Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115147</link>
            <guid>https://www.tenable.com/plugins/was/115147</guid>
            <pubDate>Tue, 17 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115147 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Configuration File Detected<br /></span>
      <h3>Description</h3>
      <span>A configuration file have been detected on the target web application. These files may contain sensitive information which could assist an attack to conduct further attacks.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to the config file or locate it outside the public webroot where possible.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115147">https://www.tenable.com/plugins/was/115147</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Claude Code Settings File Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115146</link>
            <guid>https://www.tenable.com/plugins/was/115146</guid>
            <pubDate>Tue, 17 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115146 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Claude Code Settings File Detected<br /></span>
      <h3>Description</h3>
      <span>Claude Code is an agentic coding tool developed by Anthropic that operates directly in the terminal. It uses configuration files named settings.json or settings.local.json to store its settings, including API keys, model preferences, and custom permissions.<br /></span><span><br /></span><span>If an attacker can access these settings files, they may be able to gather sensitive information such as API keys, allowed tools, MCP server configurations, and other security-sensitive settings.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the configuration file is not deployed with the application or, at least, is not exposed in a web server directory by setting proper permissions on it.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115146">https://www.tenable.com/plugins/was/115146</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Wgetrc Configuration File Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115145</link>
            <guid>https://www.tenable.com/plugins/was/115145</guid>
            <pubDate>Tue, 17 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115145 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Wgetrc Configuration File Detected<br /></span>
      <h3>Description</h3>
      <span>A Wgetrc configuration file have been detected on the target web application. These files may contain sensitive information which could assist an attack to conduct further attacks.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to the config file or locate it outside the public webroot where possible.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115145">https://www.tenable.com/plugins/was/115145</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MSMTPRC Configuration File Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115144</link>
            <guid>https://www.tenable.com/plugins/was/115144</guid>
            <pubDate>Tue, 17 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115144 with High Severity</p>
      <h3>Synopsis</h3>
      <span>MSMTPRC Configuration File Detected<br /></span>
      <h3>Description</h3>
      <span>A MSMTPRC configuration file have been detected on the target web application. These files may contain sensitive information which could assist an attack to conduct further attacks.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to the config file or locate it outside the public webroot where possible.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115144">https://www.tenable.com/plugins/was/115144</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[eSMTPRC Configuration File Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115143</link>
            <guid>https://www.tenable.com/plugins/was/115143</guid>
            <pubDate>Tue, 17 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115143 with High Severity</p>
      <h3>Synopsis</h3>
      <span>eSMTPRC Configuration File Detected<br /></span>
      <h3>Description</h3>
      <span>An eSMTPRC configuration file have been detected on the target web application. These files may contain sensitive information which could assist an attack to conduct further attacks.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to the config file or locate it outside the public webroot where possible.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115143">https://www.tenable.com/plugins/was/115143</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ruby Configuration File Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115142</link>
            <guid>https://www.tenable.com/plugins/was/115142</guid>
            <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115142 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Ruby Configuration File Detected<br /></span>
      <h3>Description</h3>
      <span>A Ruby configuration file have been detected on the target web application. These files may contain sensitive information which could assist an attack to conduct further attacks.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to the config file or locate it outside the public webroot where possible.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115142">https://www.tenable.com/plugins/was/115142</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Nginx 1.3.0 < 1.29.5 SSL Upstream Injection]]></title>
            <link>https://www.tenable.com/plugins/was/115141</link>
            <guid>https://www.tenable.com/plugins/was/115141</guid>
            <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115141 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Nginx 1.3.0 < 1.29.5 SSL Upstream Injection<br /></span>
      <h3>Description</h3>
      <span>According to its Server response header, the installed version of nginx is from 1.3.0 to 1.29.4. It is, therefore, affected by a vulnerability when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side-along with conditions beyond the attacker's control-may be able to inject plain text data into the response from an upstream proxied server.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to nginx version 1.29.5 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115141">https://www.tenable.com/plugins/was/115141</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mura CMS < 10.0.580 Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/115140</link>
            <guid>https://www.tenable.com/plugins/was/115140</guid>
            <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115140 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Mura CMS < 10.0.580 Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>Mura CMS versions prior to < 10.0.580 suffers from an authentication bypass vulnerability via a specially forged request.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Mura CMS instance to versions 7.2.5, 7.3.10 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115140">https://www.tenable.com/plugins/was/115140</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Roundcube Webmail 1.6.x < 1.6.11 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/115139</link>
            <guid>https://www.tenable.com/plugins/was/115139</guid>
            <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115139 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Roundcube Webmail 1.6.x < 1.6.11 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, Roundcube Webmail is prior to 1.5.10 or 1.6.x prior to 1.6.11. Therefore, it may be affected by a Remote code execution vulnerability by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization (CVE-2025-49113).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Roundcube Webmail version 1.6.11 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115139">https://www.tenable.com/plugins/was/115139</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Roundcube Webmail < 1.5.10 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/115138</link>
            <guid>https://www.tenable.com/plugins/was/115138</guid>
            <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115138 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Roundcube Webmail < 1.5.10 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, Roundcube Webmail is prior to 1.5.10 or 1.6.x prior to 1.6.11. Therefore, it may be affected by a Remote code execution vulnerability by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization (CVE-2025-49113).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Roundcube Webmail version 1.5.10 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115138">https://www.tenable.com/plugins/was/115138</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Roundcube Webmail 1.6.x < 1.6.12 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115137</link>
            <guid>https://www.tenable.com/plugins/was/115137</guid>
            <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115137 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Roundcube Webmail 1.6.x < 1.6.12 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, Roundcube Webmail is prior to 1.5.12 or 1.6.x prior to 1.6.12. Therefore, it may be affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - An Information disclosure vulnerability in the HTML style sanitizer.<br /></span><span><br /></span><span> - A Cross-Site-Scripting (XSS) vulnerability via the animate tag in an SVG document.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Roundcube Webmail version 1.6.12 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115137">https://www.tenable.com/plugins/was/115137</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Roundcube Webmail < 1.5.12 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115136</link>
            <guid>https://www.tenable.com/plugins/was/115136</guid>
            <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115136 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Roundcube Webmail < 1.5.12 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, Roundcube Webmail is prior to 1.5.12 or 1.6.x prior to 1.6.12. Therefore, it may be affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - An Information disclosure vulnerability in the HTML style sanitizer.<br /></span><span><br /></span><span> - A Cross-Site-Scripting (XSS) vulnerability via the animate tag in an SVG document.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Roundcube Webmail version 1.5.12 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115136">https://www.tenable.com/plugins/was/115136</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OpenCMS <= 15.0 Arbitrary File Upload]]></title>
            <link>https://www.tenable.com/plugins/was/115135</link>
            <guid>https://www.tenable.com/plugins/was/115135</guid>
            <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115135 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>OpenCMS <= 15.0 Arbitrary File Upload<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected OpenCMS application is affected by an arbitrary file upload vulnerability :<br /></span><span><br /></span><span>- An arbitrary file upload vulnerability in the component /workplace#!explorer of Alkacon OpenCMS v15.0 allows attackers to execute arbitrary code via uploading a crafted PNG file.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to OpenCMS 16.0.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115135">https://www.tenable.com/plugins/was/115135</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OpenCMS 14.0.0 < 16.0.0 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115134</link>
            <guid>https://www.tenable.com/plugins/was/115134</guid>
            <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115134 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>OpenCMS 14.0.0 < 16.0.0 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected OpenCMS application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span>- An Open redirect vulnerability due to the fact that there is no proper sanitization of the 'URI' parameter.<br /></span><span><br /></span><span>- A Cross-site scripting (XSS) vulnerability in the 'Mercury' template.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to OpenCMS 16.0.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115134">https://www.tenable.com/plugins/was/115134</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OpenCMS < 17.0.0 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115133</link>
            <guid>https://www.tenable.com/plugins/was/115133</guid>
            <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115133 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>OpenCMS < 17.0.0 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected OpenCMS application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span>- A Cross-Site Scripting which could allow a user having the roles of gallery editor or VFS resource manager will have the permission to upload images in the .svg format containing JavaScript code.<br /></span><span><br /></span><span>- A Cross-Site Scripting which could allow a user with sufficient privileges to create and modify web pages through the admin panel, can execute malicious JavaScript code, after inserting code in the "title" field.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to OpenCMS 17.0.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115133">https://www.tenable.com/plugins/was/115133</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OpenCMS <= 18.0.0 Multiple Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/115132</link>
            <guid>https://www.tenable.com/plugins/was/115132</guid>
            <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115132 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>OpenCMS <= 18.0.0 Multiple Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected OpenCMS application is affected by multiple Cross-Site Scripting (XSS) vulnerabilities :<br /></span><span><br /></span><span>- A Cross-Site Scripting vulnerability allows a remote attacker to inject a javascript payload via the image title sub-field in the image field.<br /></span><span><br /></span><span>- A Stored Cross-Site Scripting (XSS) vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the author parameter.<br /></span><span><br /></span><span>- A stored Cross-Site Scripting (XSS) vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the image parameter.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to OpenCMS 18.0.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115132">https://www.tenable.com/plugins/was/115132</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Airflow Configuration File Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115131</link>
            <guid>https://www.tenable.com/plugins/was/115131</guid>
            <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115131 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Airflow Configuration File Detected<br /></span>
      <h3>Description</h3>
      <span>Apache Airflow is an open-source platform to programmatically author, schedule, and monitor workflows. By default, Apache Airflow uses a configuration file named airflow.cfg to store its configuration settings.<br /></span><span><br /></span><span>If an attacker can access the airflow.cfg file, they may be able to gather sensitive information about the Airflow instance, such as database connection details, authentication credentials, and other configuration settings.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the configuration file is not deployed with the application or, at least, is not exposed in a web server directory by setting proper permissions on it.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115131">https://www.tenable.com/plugins/was/115131</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ansible Configuration File Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115130</link>
            <guid>https://www.tenable.com/plugins/was/115130</guid>
            <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115130 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Ansible Configuration File Detected<br /></span>
      <h3>Description</h3>
      <span>Ansible is an open-source automation tool used for configuration management, application deployment, and task automation. Ansible uses a configuration file (ansible.cfg) to define settings and options for its operation.<br /></span><span><br /></span><span>The presence of the Ansible configuration file on a system can pose a security risk if it contains sensitive information such as passwords, API keys, or other credentials.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the configuration file is not deployed with the application or, at least, is not exposed in a web server directory by setting proper permissions on it.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115130">https://www.tenable.com/plugins/was/115130</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Configuration File Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115129</link>
            <guid>https://www.tenable.com/plugins/was/115129</guid>
            <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115129 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Configuration File Detected<br /></span>
      <h3>Description</h3>
      <span>Apache configuration files may contain sensitive information about the web server and its environment. If an attacker is able to access these files, they may be able to gather information that could be used to exploit vulnerabilities in the web server or its applications.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the configuration file is not deployed with the application or, at least, is not exposed in a web server directory by setting proper permissions on it.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115129">https://www.tenable.com/plugins/was/115129</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ivanti Endpoint Manager Mobile < 12.8.0.0 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/115128</link>
            <guid>https://www.tenable.com/plugins/was/115128</guid>
            <pubDate>Tue, 03 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115128 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Ivanti Endpoint Manager Mobile < 12.8.0.0 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>Ivanti Endpoint Manager Mobile (EPMM) versions prior to 12.8.0.0 are affected by a vulnerability allowing an unauthenticated remote attacker to execute arbitrary code on the affected system through a specially crafted request.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Ivanti Endpoint Manager Mobile version 12.8.0.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115128">https://www.tenable.com/plugins/was/115128</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Kubernetes Kustomization Configuration Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115127</link>
            <guid>https://www.tenable.com/plugins/was/115127</guid>
            <pubDate>Tue, 03 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115127 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Kubernetes Kustomization Configuration Detected<br /></span>
      <h3>Description</h3>
      <span>`kustomization.yml` is a configuration file used by Kustomize, a tool for customizing Kubernetes resource configurations. This file can contain sensitive information such as resource definitions, patches, and overlays that could be exploited by attackers if exposed publicly.<br /></span><span><br /></span><span>If an attacker gains access to the `kustomization.yml` file, they could potentially manipulate Kubernetes resources, leading to unauthorized access, data breaches, or service disruptions within the Kubernetes cluster.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the `kustomization.yml` configuration file is not deployed with the application or, at least, is not exposed in a web server directory by setting proper permissions on it. If sensitive information like credentials are leaked in the exposed file, they should be revoked and reset on the affected assets.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115127">https://www.tenable.com/plugins/was/115127</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[CodeDeploy Appspec Configuration Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115126</link>
            <guid>https://www.tenable.com/plugins/was/115126</guid>
            <pubDate>Fri, 30 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115126 with High Severity</p>
      <h3>Synopsis</h3>
      <span>CodeDeploy Appspec Configuration Detected<br /></span>
      <h3>Description</h3>
      <span>CodeDeploy `appspec.yml` is a configuration file used in AWS CodeDeploy deployments to define how application files should be copied and what lifecycle event hooks should be executed during the deployment process.<br /></span><span><br /></span><span>This plugin checks for the presence of the `appspec.yml` file in web applications. If this file is publicly accessible, it can lead to the exposure of sensitive information that could be exploited by attackers.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the `appspec.yml` configuration file is not deployed with the application or, at least, is not exposed in a web server directory by setting proper permissions on it. If sensitive information like credentials are leaked in the exposed file, they should be revoked and reset on the affected assets.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115126">https://www.tenable.com/plugins/was/115126</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Parameters YML Configuration Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115125</link>
            <guid>https://www.tenable.com/plugins/was/115125</guid>
            <pubDate>Fri, 30 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115125 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Parameters YML Configuration Detected<br /></span>
      <h3>Description</h3>
      <span>`parameters.yml` is a configuration file commonly used in Symfony-based web applications to store various settings, including database credentials, API keys, and other sensitive information.<br /></span><span><br /></span><span>This plugin checks for the presence of the `parameters.yml` file in web applications. If this file is publicly accessible, it can lead to the exposure of sensitive information that could be exploited by attackers.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the `parameters.yml` configuration file is not deployed with the application or, at least, is not exposed in a web server directory by setting proper permissions on it. If sensitive information like credentials are leaked in the exposed file, they should be revoked and reset on the affected assets.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115125">https://www.tenable.com/plugins/was/115125</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Firebase Configuration Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115124</link>
            <guid>https://www.tenable.com/plugins/was/115124</guid>
            <pubDate>Fri, 30 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115124 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Firebase Configuration Detected<br /></span>
      <h3>Description</h3>
      <span>Firebase is a platform developed by Google for creating mobile and web applications. It provides various services, including real-time databases, authentication, and hosting.<br /></span><span><br /></span><span>This plugin checks for the presence of Firebase configuration files in web applications. These files often contain sensitive information such as API keys, project IDs, and other configuration details that could be exploited by attackers if exposed publicly.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the firebase configuration file is not deployed with the application or, at least, is not exposed in a web server directory by setting proper permissions on it. If sensitive information like credentials are leaked in the exposed file, they should be revoked and reset on the affected assets.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115124">https://www.tenable.com/plugins/was/115124</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OpenClaw Gateway Dashboard Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115123</link>
            <guid>https://www.tenable.com/plugins/was/115123</guid>
            <pubDate>Fri, 30 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115123 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>OpenClaw Gateway Dashboard Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected a publicly accessible OpenClaw Gateway Dashboard instance on the target application. OpenClaw is your own personal AI assistant. This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span>If the application is not expected to be public, restrict access using a .htaccess file, limiting access to known IP Addresses.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115123">https://www.tenable.com/plugins/was/115123</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Versa Concerto 11.4.x < 12.1.2 Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/115121</link>
            <guid>https://www.tenable.com/plugins/was/115121</guid>
            <pubDate>Wed, 28 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115121 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Versa Concerto 11.4.x < 12.1.2 Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>Versa Concerto version 11.4.x prior to 12.1.2 is affected by an authentication bypass vulnerability. An unauthenticated remote attacker can exploit this vulnerability to gain unauthorized access to the internal Actuator endpoint.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Versa Concerto version 12.1.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115121">https://www.tenable.com/plugins/was/115121</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Vite < 4.5.11 / 5.0.x < 5.4.16 / 6.0.x < 6.0.13 / 6.1.x < 6.1.3 / 6.2.x < 6.2.4 Arbitrary File Read]]></title>
            <link>https://www.tenable.com/plugins/was/115120</link>
            <guid>https://www.tenable.com/plugins/was/115120</guid>
            <pubDate>Wed, 28 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115120 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Vite < 4.5.11 / 5.0.x < 5.4.16 / 6.0.x < 6.0.13 / 6.1.x < 6.1.3 / 6.2.x < 6.2.4 Arbitrary File Read<br /></span>
      <h3>Description</h3>
      <span>Vite version prior to 4.5.11, 5.0.x prior to 5.4.16, 6.0.x prior to 6.0.13, 6.1.x prior to 6.1.3 or 6.2.x prior to 6.2.4 are affected by a vulnerability allowing unauthenticated remote attackers to read arbitrary files on the affected host when the app is exposing the Vite dev server to the network.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Vite 4.5.11, 5.4.16, 6.0.13, 6.1.3, 6.2.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115120">https://www.tenable.com/plugins/was/115120</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Redis Configuration File Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115119</link>
            <guid>https://www.tenable.com/plugins/was/115119</guid>
            <pubDate>Wed, 28 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115119 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Redis Configuration File Detected<br /></span>
      <h3>Description</h3>
      <span>A Redis configuration file have been detected on the target web application. These files may contain sensitive information which could assist an attack to conduct further attacks.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to the config file or locate it outside the public webroot where possible.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115119">https://www.tenable.com/plugins/was/115119</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SmarterMail < build 9413 Unrestricted File Upload]]></title>
            <link>https://www.tenable.com/plugins/was/115117</link>
            <guid>https://www.tenable.com/plugins/was/115117</guid>
            <pubDate>Wed, 28 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115117 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>SmarterMail < build 9413 Unrestricted File Upload<br /></span>
      <h3>Description</h3>
      <span>SmarterMail version prior to build 9413 are affected by an Unrestricted File Upload vulnerability. An unauthenticated attacker can exploit this issue to upload arbitrary files to the server, which could lead to remote code execution.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to SmarterMail build 9413 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115117">https://www.tenable.com/plugins/was/115117</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OpenAssistantGPT Chatbot Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115116</link>
            <guid>https://www.tenable.com/plugins/was/115116</guid>
            <pubDate>Wed, 28 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115116 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>OpenAssistantGPT Chatbot Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected a publicly accessible OpenAssistantGPT chatbot on the target application. OpenAssistantGPT is community open-Source SaaS for crafting/building/creating chatbots with OpenAI's assistant API that you can add to your website. This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115116">https://www.tenable.com/plugins/was/115116</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Zimbra Collaboration 10.0.x < 10.0.18 / 10.1.x < 10.1.13 Local File Inclusion]]></title>
            <link>https://www.tenable.com/plugins/was/115122</link>
            <guid>https://www.tenable.com/plugins/was/115122</guid>
            <pubDate>Tue, 27 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115122 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Zimbra Collaboration 10.0.x < 10.0.18 / 10.1.x < 10.1.13 Local File Inclusion<br /></span>
      <h3>Description</h3>
      <span>Zimbra Collaboration versions prior to 10.0.18 and 10.1.13 are vulnerable to Local File Inclusion (LFI) in the Webmail Classic UI due to improper handling of user-supplied request parameters in the RestFilter servlet. An unauthenticated remote attacker can exploit this vulnerability by crafting requests to the /h/rest endpoint, which can lead to the inclusion of arbitrary files from the WebRoot directory.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Zimbra 10.0.18 or 10.1.13 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115122">https://www.tenable.com/plugins/was/115122</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Deep Chat Chatbot Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115115</link>
            <guid>https://www.tenable.com/plugins/was/115115</guid>
            <pubDate>Wed, 21 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115115 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Deep Chat Chatbot Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected a publicly accessible Deep Chat chatbot on the target application. Deep Chat is an open-source framework for building AI chatbots that can be integrated into websites and applications. This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115115">https://www.tenable.com/plugins/was/115115</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SSH Known Hosts File Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115114</link>
            <guid>https://www.tenable.com/plugins/was/115114</guid>
            <pubDate>Wed, 21 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115114 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>SSH Known Hosts File Detected<br /></span>
      <h3>Description</h3>
      <span>A SSH Known Hosts file have been detected on the target web application. These files may contain sensitive information which could assist an attack to conduct further attacks.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to the SSH known hosts file or locate it outside the public webroot where possible.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115114">https://www.tenable.com/plugins/was/115114</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Livewire 3.x < 3.6.4 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/115113</link>
            <guid>https://www.tenable.com/plugins/was/115113</guid>
            <pubDate>Thu, 15 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115113 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Livewire 3.x < 3.6.4 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>Livewire is a full-stack framework for Laravel that makes building dynamic interfaces simple, without leaving the comfort of Laravel.<br /></span><span><br /></span><span>A remote code execution vulnerability exists in Livewire versions prior to 3.6.4 due to improper handling of serialized data during the component hydration process. An attacker can exploit this vulnerability by sending a specially crafted request containing malicious serialized data to the server, which is then deserialized and executed, allowing the attacker to execute arbitrary code on the server.<br /></span><span><br /></span><span>Note: Depending on the identified version of Livewire, the plugin indicates that the website is **potentially** vulnerable if it uses version 3.6.3 (vulnerable) or 3.6.4 (patched).<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Livewire version 3.6.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115113">https://www.tenable.com/plugins/was/115113</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Livewire Request Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115112</link>
            <guid>https://www.tenable.com/plugins/was/115112</guid>
            <pubDate>Thu, 15 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115112 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Livewire Request Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected the usage of the Livewire framework in the target web application. Livewire is a full-stack framework for Laravel that makes building dynamic interfaces simple, without leaving the comfort of Laravel.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115112">https://www.tenable.com/plugins/was/115112</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Private Key File Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115111</link>
            <guid>https://www.tenable.com/plugins/was/115111</guid>
            <pubDate>Thu, 15 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115111 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Private Key File Detected<br /></span>
      <h3>Description</h3>
      <span>Private keys are cryptographic credentials used for secure communications in protocols like SSL/TLS, SSH, and JWT signing. If exposed, an attacker can impersonate the server, decrypt sensitive communications, or forge authentication tokens to gain unauthorized access to systems and data.<br /></span>
      <h3>Solution</h3>
      <span>Immediately rotate and revoke the exposed private key. Remove the private key file from the publicly accessible location and store it in a secure vault or secrets management system (e.g., HashiCorp Vault, AWS Secrets Manager, Azure Key Vault). Restrict file system permissions to prevent unauthorized access. Audit logs to identify potential unauthorized use of the compromised key.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115111">https://www.tenable.com/plugins/was/115111</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[JetBrains TeamCity Guest Access Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115110</link>
            <guid>https://www.tenable.com/plugins/was/115110</guid>
            <pubDate>Thu, 15 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115110 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>JetBrains TeamCity Guest Access Detected<br /></span>
      <h3>Description</h3>
      <span>JetBrains TeamCity is a continuous integration and build management system that allows guest access if the feature is enabled. If guest login is enabled, an attacker can access the TeamCity server without authentication, potentially leading to unauthorized access to sensitive information and system functionalities.<br /></span>
      <h3>Solution</h3>
      <span>If guest login is not required, disable the guest login feature in the TeamCity administration interface to prevent unauthorized access.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115110">https://www.tenable.com/plugins/was/115110</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[JetBrains TeamCity Registration Enabled]]></title>
            <link>https://www.tenable.com/plugins/was/115109</link>
            <guid>https://www.tenable.com/plugins/was/115109</guid>
            <pubDate>Thu, 15 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115109 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>JetBrains TeamCity Registration Enabled<br /></span>
      <h3>Description</h3>
      <span>JetBrains TeamCity is a continuous integration and build management system. By default, TeamCity allows users to self-register for an account. If the self-registration feature is enabled, an attacker can create an account without any authorization, potentially leading to unauthorized access to the TeamCity server.<br /></span>
      <h3>Solution</h3>
      <span>Disable the self-registration feature in the TeamCity administration interface to prevent unauthorized account creation.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115109">https://www.tenable.com/plugins/was/115109</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SAP NetWeaver ICM Info Sensitive Information Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/115108</link>
            <guid>https://www.tenable.com/plugins/was/115108</guid>
            <pubDate>Thu, 15 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115108 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>SAP NetWeaver ICM Info Sensitive Information Disclosure<br /></span>
      <h3>Description</h3>
      <span>SAP NetWeaver Internet Communication Manager (ICM) includes an information page that can disclose sensitive information about the SAP platform, such as operating system version, SAP version, IP address, and other details. If this page is accessible without proper authentication, it can expose information that could be leveraged by attackers to plan further attacks against the system.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to administrative functionality, limiting access to known IP Addresses.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115108">https://www.tenable.com/plugins/was/115108</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ambassador API Gateway Diagnostics Sensitive Information Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/115107</link>
            <guid>https://www.tenable.com/plugins/was/115107</guid>
            <pubDate>Thu, 15 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115107 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Ambassador API Gateway Diagnostics Sensitive Information Disclosure<br /></span>
      <h3>Description</h3>
      <span>Ambassador API Gateway includes a diagnostics portal that provides detailed information about the API Gateway's configuration and operation. If this portal is accessible without proper authentication, it can expose sensitive information such as service mappings, API endpoints, routing configurations, and internal cluster information. An attacker could leverage this information to plan further attacks against the system.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to administrative functionality, limiting access to known IP Addresses.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115107">https://www.tenable.com/plugins/was/115107</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Shibboleth SSO Open Redirect]]></title>
            <link>https://www.tenable.com/plugins/was/115106</link>
            <guid>https://www.tenable.com/plugins/was/115106</guid>
            <pubDate>Thu, 15 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115106 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Shibboleth SSO Open Redirect<br /></span>
      <h3>Description</h3>
      <span>Shibboleth Service Provider (SP) contains an open redirect vulnerability. An attacker can exploit this vulnerability to redirect users to malicious websites, potentially leading to phishing attacks or other malicious activities. This issue arises when the 'redirectLimit' configuration option is not properly set.<br /></span>
      <h3>Solution</h3>
      <span>Configure the 'redirectLimit' option in the Shibboleth Service Provider configuration to prevents the injection of redirect locations.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115106">https://www.tenable.com/plugins/was/115106</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[N8n < 1.121.0 Remote Code Execution (Ni8mare)]]></title>
            <link>https://www.tenable.com/plugins/was/115105</link>
            <guid>https://www.tenable.com/plugins/was/115105</guid>
            <pubDate>Thu, 08 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115105 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>N8n < 1.121.0 Remote Code Execution (Ni8mare)<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of n8n running on the remote host is before 1.121.0. It is, therefore, affected by an unauthentcated file access vulnerability which can leads to remote code execution.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to n8n version 1.121.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115105">https://www.tenable.com/plugins/was/115105</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[N8n < 1.121.3 Arbitrary File Write]]></title>
            <link>https://www.tenable.com/plugins/was/115104</link>
            <guid>https://www.tenable.com/plugins/was/115104</guid>
            <pubDate>Thu, 08 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115104 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>N8n < 1.121.3 Arbitrary File Write<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of n8n running on the remote host is after 0.123.0 and before 1.121.3. It is, therefore, affected by an authenticated arbitrary file write.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to n8n version 1.121.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115104">https://www.tenable.com/plugins/was/115104</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[N8n < 2.0.0 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115103</link>
            <guid>https://www.tenable.com/plugins/was/115103</guid>
            <pubDate>Thu, 08 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115103 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>N8n < 2.0.0 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of n8n running on the remote host is 1.0.0 or later and before 2.0.0. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- An authenticated arbitrary file read and file write vulnerability<br /></span><span><br /></span><span>- An authenticated arbitrary command execution vulnerability in Pyodide based Python code node<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to n8n version 2.0.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115103">https://www.tenable.com/plugins/was/115103</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[N8n < 2.2.2 Unauthenticated Forged Webhooks]]></title>
            <link>https://www.tenable.com/plugins/was/115102</link>
            <guid>https://www.tenable.com/plugins/was/115102</guid>
            <pubDate>Thu, 08 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115102 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>N8n < 2.2.2 Unauthenticated Forged Webhooks<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of n8n running on the remote host is 0.150 or later and before 2.2.2. It is, therefore, affected by an authentication bypass in the Stripe trigger, allowing unauthenticated parties to trigger workflows by sending forget Stripe webhook events.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to n8n version 2.2.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115102">https://www.tenable.com/plugins/was/115102</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Joomla! 6.x < 6.0.2 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115101</link>
            <guid>https://www.tenable.com/plugins/was/115101</guid>
            <pubDate>Thu, 08 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115101 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Joomla! 6.x < 6.0.2 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the instance of Joomla! running on the remote web server is 3.9.x prior to 5.4.2, or 6.x prior to 6.0.2. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span> - Lack of input filtering leads to an XSS vector in the HTML filter code related to data URLs in img tags. (CVE-2025-63082)<br /></span><span><br /></span><span> - Lack of output escaping leads to a XSS vector in the pagebreak and pagenavigation plugins. (CVE-2025-63083)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Joomla! version 6.0.2 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115101">https://www.tenable.com/plugins/was/115101</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Joomla! 3.9.x < 5.4.2 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115100</link>
            <guid>https://www.tenable.com/plugins/was/115100</guid>
            <pubDate>Thu, 08 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115100 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Joomla! 3.9.x < 5.4.2 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the instance of Joomla! running on the remote web server is 3.9.x prior to 5.4.2, or 6.x prior to 6.0.2. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span> - Lack of input filtering leads to an XSS vector in the HTML filter code related to data URLs in img tags. (CVE-2025-63082)<br /></span><span><br /></span><span> - Lack of output escaping leads to a XSS vector in the pagebreak and pagenavigation plugins. (CVE-2025-63083)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Joomla! version 5.4.2 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115100">https://www.tenable.com/plugins/was/115100</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Next.js Configuration File Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115098</link>
            <guid>https://www.tenable.com/plugins/was/115098</guid>
            <pubDate>Thu, 08 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115098 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Next.js Configuration File Detected<br /></span>
      <h3>Description</h3>
      <span>Next.js is a popular React framework for building web applications. By default, Next.js applications may include a configuration file named next.config.js, which contains various settings and options for the application. If this configuration file is accessible via the web server, it can expose sensitive information about the application's structure, environment variables, and other configurations that could be exploited by attackers.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the configuration file is not deployed with the application or, at least, is not exposed in a web server directory by setting proper permissions on it.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115098">https://www.tenable.com/plugins/was/115098</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Sitecore Debug Page Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115097</link>
            <guid>https://www.tenable.com/plugins/was/115097</guid>
            <pubDate>Thu, 08 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115097 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Sitecore Debug Page Detected<br /></span>
      <h3>Description</h3>
      <span>Sitecore is a popular web content management system (WCMS) used for building and managing websites. When the debug page is accessible, it can expose sensitive information about the application's configuration, environment, and code structure. This information can be exploited by attackers to identify vulnerabilities and launch targeted attacks against the application.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to the '/sitecore/' directory or ensure debug mode is disabled in production environments.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115097">https://www.tenable.com/plugins/was/115097</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Commvault CommandCenter < 11.36.60 Unauthorized API Access]]></title>
            <link>https://www.tenable.com/plugins/was/115096</link>
            <guid>https://www.tenable.com/plugins/was/115096</guid>
            <pubDate>Thu, 08 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115096 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Commvault CommandCenter < 11.36.60 Unauthorized API Access<br /></span>
      <h3>Description</h3>
      <span>Commvault CommandCenter versions prior to 11.36.60 contain a vulnerability in a known login mechanism that allows unauthenticated attackers to execute API calls without requiring user credentials.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Commvault CommandCenter version 11.36.60 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115096">https://www.tenable.com/plugins/was/115096</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Symfony Conflicting Headers Information Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/115099</link>
            <guid>https://www.tenable.com/plugins/was/115099</guid>
            <pubDate>Wed, 07 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115099 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Symfony Conflicting Headers Information Disclosure<br /></span>
      <h3>Description</h3>
      <span>The remote web application is using Symfony, a PHP framework. It is affected by an information disclosure vulnerability arising from conflicting proxy headers.<br /></span><span><br /></span><span>When both 'Forwarded' and 'X-Forwarded-*' headers are present in a request, a misconfiguration in Symfony's trusted proxy settings can trigger a 'ConflictingHeadersException'. If the application is running with debug mode enabled in a production environment, this exception can expose sensitive environment details, such as SMTP credentials, internal application paths, and system configuration.<br /></span>
      <h3>Solution</h3>
      <span>Disable debug mode in production environments. Review and update the application's 'trusted_proxies' configuration to ensure it correctly handles incoming headers. Configure the application to prioritize or strictly define which proxy headers (standard 'Forwarded' vs 'X-Forwarded-*') are accepted, preventing conflicts.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115099">https://www.tenable.com/plugins/was/115099</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[JFrog Artifactory Artifacts Repository Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115095</link>
            <guid>https://www.tenable.com/plugins/was/115095</guid>
            <pubDate>Mon, 05 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115095 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>JFrog Artifactory Artifacts Repository Detected<br /></span>
      <h3>Description</h3>
      <span>JFrog Artifactory is a popular repository management tool used to store and manage software artifacts. If the Artifacts repository is detected and accessible, it may expose sensitive information or allow unauthorized access to stored artifacts.<br /></span>
      <h3>Solution</h3>
      <span>If the application is not expected to be public, disable anonymous access in the Artifactory administration settings. Alternatively, restrict access using network access controls (ACLs) or web server configuration (e.g., .htaccess for Apache, allow/deny for Nginx) to limit access to known IP addresses.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115095">https://www.tenable.com/plugins/was/115095</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Nexus Repository Anonymous Access]]></title>
            <link>https://www.tenable.com/plugins/was/115094</link>
            <guid>https://www.tenable.com/plugins/was/115094</guid>
            <pubDate>Mon, 05 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115094 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Nexus Repository Anonymous Access<br /></span>
      <h3>Description</h3>
      <span>Nexus Repository Manager is a popular repository management tool used to store and manage software artifacts. If anonymous access is enabled, unauthenticated users can list and browse repositories, potentially exposing private artifacts such as source code, packages, and Docker images.<br /></span>
      <h3>Solution</h3>
      <span>Disable anonymous access in the Nexus Repository Manager settings.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115094">https://www.tenable.com/plugins/was/115094</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[PHP 8.1.x < 8.1.34 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115093</link>
            <guid>https://www.tenable.com/plugins/was/115093</guid>
            <pubDate>Mon, 05 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115093 with High Severity</p>
      <h3>Synopsis</h3>
      <span>PHP 8.1.x < 8.1.34 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the version of PHP installed on the remote host is 8.2.x prior to 8.2.30, 8.3.x prior to 8.3.29, 8.4.x prior to 8.4.16, or 8.5.x prior to 8.5.1. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span> - Information leak of memory in getimagesize. (CVE-2025-14177)<br /></span><span><br /></span><span> - Heap buffer overflow in array_merge(). (CVE-2025-14178)<br /></span><span><br /></span><span> - PDO quoting result null dereference. (CVE-2025-14180)<br /></span><span><br /></span><span> - Unbounded recursion and stack consumption. (CVE-2025-67899) Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to PHP version 8.1.34 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115093">https://www.tenable.com/plugins/was/115093</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Behat Configuration File Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115092</link>
            <guid>https://www.tenable.com/plugins/was/115092</guid>
            <pubDate>Mon, 05 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115092 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Behat Configuration File Detected<br /></span>
      <h3>Description</h3>
      <span>Behat is a Behavior Driven Development (BDD) framework for PHP. It allows the execution of feature documentation written in business-facing text. Behat uses a configuration file named behat.yml to set up various options and parameters for running tests.<br /></span><span><br /></span><span>The presence of the behat.yml configuration file on a web server may expose sensitive information, such as database credentials, API keys, or other configuration details that could be exploited by an attacker.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the configuration file is not deployed with the application or, at least, is not exposed in a web server directory by setting proper permissions on it.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115092">https://www.tenable.com/plugins/was/115092</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[PHP 8.2.x < 8.2.30 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115091</link>
            <guid>https://www.tenable.com/plugins/was/115091</guid>
            <pubDate>Mon, 05 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115091 with High Severity</p>
      <h3>Synopsis</h3>
      <span>PHP 8.2.x < 8.2.30 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the version of PHP installed on the remote host is 8.2.x prior to 8.2.30, 8.3.x prior to 8.3.29, 8.4.x prior to 8.4.16, or 8.5.x prior to 8.5.1. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span> - Information leak of memory in getimagesize. (CVE-2025-14177)<br /></span><span><br /></span><span> - Heap buffer overflow in array_merge(). (CVE-2025-14178)<br /></span><span><br /></span><span> - PDO quoting result null dereference. (CVE-2025-14180)<br /></span><span><br /></span><span> - Unbounded recursion and stack consumption. (CVE-2025-67899) Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to PHP version 8.2.30 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115091">https://www.tenable.com/plugins/was/115091</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[PHP 8.3.x < 8.3.29 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115090</link>
            <guid>https://www.tenable.com/plugins/was/115090</guid>
            <pubDate>Mon, 05 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115090 with High Severity</p>
      <h3>Synopsis</h3>
      <span>PHP 8.3.x < 8.3.29 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the version of PHP installed on the remote host is 8.2.x prior to 8.2.30, 8.3.x prior to 8.3.29, 8.4.x prior to 8.4.16, or 8.5.x prior to 8.5.1. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span> - Information leak of memory in getimagesize. (CVE-2025-14177)<br /></span><span><br /></span><span> - Heap buffer overflow in array_merge(). (CVE-2025-14178)<br /></span><span><br /></span><span> - PDO quoting result null dereference. (CVE-2025-14180)<br /></span><span><br /></span><span> - Unbounded recursion and stack consumption. (CVE-2025-67899) Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to PHP version 8.3.29 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115090">https://www.tenable.com/plugins/was/115090</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[PHP 8.4.x < 8.4.16 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115089</link>
            <guid>https://www.tenable.com/plugins/was/115089</guid>
            <pubDate>Mon, 05 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115089 with High Severity</p>
      <h3>Synopsis</h3>
      <span>PHP 8.4.x < 8.4.16 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the version of PHP installed on the remote host is 8.2.x prior to 8.2.30, 8.3.x prior to 8.3.29, 8.4.x prior to 8.4.16, or 8.5.x prior to 8.5.1. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span> - Information leak of memory in getimagesize. (CVE-2025-14177)<br /></span><span><br /></span><span> - Heap buffer overflow in array_merge(). (CVE-2025-14178)<br /></span><span><br /></span><span> - PDO quoting result null dereference. (CVE-2025-14180)<br /></span><span><br /></span><span> - Unbounded recursion and stack consumption. (CVE-2025-67899) Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to PHP version 8.4.16 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115089">https://www.tenable.com/plugins/was/115089</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[PHP 8.5.x < 8.5.1 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115088</link>
            <guid>https://www.tenable.com/plugins/was/115088</guid>
            <pubDate>Mon, 05 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115088 with High Severity</p>
      <h3>Synopsis</h3>
      <span>PHP 8.5.x < 8.5.1 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the version of PHP installed on the remote host is 8.2.x prior to 8.2.30, 8.3.x prior to 8.3.29, 8.4.x prior to 8.4.16, or 8.5.x prior to 8.5.1. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span> - Information leak of memory in getimagesize. (CVE-2025-14177)<br /></span><span><br /></span><span> - Heap buffer overflow in array_merge(). (CVE-2025-14178)<br /></span><span><br /></span><span> - PDO quoting result null dereference. (CVE-2025-14180)<br /></span><span><br /></span><span> - Unbounded recursion and stack consumption. (CVE-2025-67899) Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to PHP version 8.5.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115088">https://www.tenable.com/plugins/was/115088</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[PostgREST API Server Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115087</link>
            <guid>https://www.tenable.com/plugins/was/115087</guid>
            <pubDate>Mon, 05 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115087 with High Severity</p>
      <h3>Synopsis</h3>
      <span>PostgREST API Server Detected<br /></span>
      <h3>Description</h3>
      <span>PostgREST is a standalone web server that turns your PostgreSQL database directly into a RESTful API. By default, PostgREST does not implement any authentication or access control mechanisms, which can lead to unauthorized access to sensitive data if the server is exposed to untrusted networks without proper safeguards in place.<br /></span><span><br /></span><span>An attacker who discovers an exposed PostgREST server could potentially retrieve, modify, or delete data from the underlying PostgreSQL database, depending on the database permissions configured for the PostgREST user. This could lead to data breaches, data loss, or unauthorized data manipulation.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access using a .htaccess file, limiting access to known IP Addresses.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115087">https://www.tenable.com/plugins/was/115087</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FreeBPX 17.0.x < 17.0.23 Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/115086</link>
            <guid>https://www.tenable.com/plugins/was/115086</guid>
            <pubDate>Mon, 05 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115086 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>FreeBPX 17.0.x < 17.0.23 Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the FreePBOX application running on the remote host is prior to 16.0.44 or 17.x prior to 17.0.23. It is, therefore, affected by an authentication bypass when providing an Authorization header with an arbitrary value, a session is associated with the target user regardless of valid credentials.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to FreeBPX version 17.0.23 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115086">https://www.tenable.com/plugins/was/115086</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FreeBPX < 16.0.44 Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/115085</link>
            <guid>https://www.tenable.com/plugins/was/115085</guid>
            <pubDate>Mon, 05 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115085 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>FreeBPX < 16.0.44 Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the FreePBOX application running on the remote host is prior to 16.0.44 or 17.x prior to 17.0.23. It is, therefore, affected by an authentication bypass when providing an Authorization header with an arbitrary value, a session is associated with the target user regardless of valid credentials.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to FreeBPX version 16.0.44 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115085">https://www.tenable.com/plugins/was/115085</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FreeBPX 17.0.x < 17.0.6 Multiples Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115084</link>
            <guid>https://www.tenable.com/plugins/was/115084</guid>
            <pubDate>Mon, 05 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115084 with High Severity</p>
      <h3>Synopsis</h3>
      <span>FreeBPX 17.0.x < 17.0.6 Multiples Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the FreePBOX application running on the remote host is prior to 16.0.92 or 17.x prior to 17.0.6. It is, therefore, affected by multiples vulnerabilities :<br /></span><span><br /></span><span>- An arbitrary file upload vulnerability in the FreePBX Endpoint Management module affecting the fwbrand parameter.<br /></span><span><br /></span><span>- SQL injection vulnerabilities exist in the FreePBX Endpoint Management module affecting multiple parameters.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to FreeBPX version 17.0.6 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115084">https://www.tenable.com/plugins/was/115084</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FreeBPX < 16.0.92 Multiples Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115083</link>
            <guid>https://www.tenable.com/plugins/was/115083</guid>
            <pubDate>Mon, 05 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115083 with High Severity</p>
      <h3>Synopsis</h3>
      <span>FreeBPX < 16.0.92 Multiples Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the FreePBOX application running on the remote host is prior to 16.0.92 or 17.x prior to 17.0.6. It is, therefore, affected by multiples vulnerabilities :<br /></span><span><br /></span><span>- An arbitrary file upload vulnerability in the FreePBX Endpoint Management module affecting the fwbrand parameter.<br /></span><span><br /></span><span>- SQL injection vulnerabilities exist in the FreePBX Endpoint Management module affecting multiple parameters.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to FreeBPX version 16.0.92 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115083">https://www.tenable.com/plugins/was/115083</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Astro < 5.15.8 Reflected Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/115082</link>
            <guid>https://www.tenable.com/plugins/was/115082</guid>
            <pubDate>Wed, 17 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115082 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Astro < 5.15.8 Reflected Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>Astro framework versions prior to 5.15.8 are vulnerable to a Reflected Cross-Site Scripting ...<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Astro 5.15.8 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115082">https://www.tenable.com/plugins/was/115082</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Jira 11.x < 11.2.0 XML External Entity Injection]]></title>
            <link>https://www.tenable.com/plugins/was/115081</link>
            <guid>https://www.tenable.com/plugins/was/115081</guid>
            <pubDate>Wed, 17 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115081 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Jira 11.x < 11.2.0 XML External Entity Injection<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Jira application running on the remote host is 10.3.x prior to 10.3.13 or 11.x prior to 11.2.0. It is, therefore, affected by a XML External Entity Injection (XXE) vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Jira version 11.2.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115081">https://www.tenable.com/plugins/was/115081</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Jira 10.3.x < 10.3.13 XML External Entity Injection]]></title>
            <link>https://www.tenable.com/plugins/was/115080</link>
            <guid>https://www.tenable.com/plugins/was/115080</guid>
            <pubDate>Wed, 17 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115080 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Jira 10.3.x < 10.3.13 XML External Entity Injection<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Jira application running on the remote host is 10.3.x prior to 10.3.13 or 11.x prior to 11.2.0. It is, therefore, affected by a XML External Entity Injection (XXE) vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Jira version 10.3.13 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115080">https://www.tenable.com/plugins/was/115080</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Kubernetes Configuration Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115079</link>
            <guid>https://www.tenable.com/plugins/was/115079</guid>
            <pubDate>Wed, 17 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115079 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Kubernetes Configuration Detected<br /></span>
      <h3>Description</h3>
      <span>Kubernetes is an open-source container orchestration platform used to automate the deployment, scaling, and management of containerized applications. Kubernetes configuration files, such as YAML manifests, define resources like Deployments, Services, ConfigMaps, and Secrets.\n\nWhen exposed with the web application, these configuration files can be used by an attacker to gain access to sensitive information, including cluster architecture details, environment variables, and potentially secrets or credentials.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that Kubernetes configuration files (such as YAML manifests defining Deployments, Services, ConfigMaps, and Secrets) are not deployed with the application or exposed in a web server directory. Set proper permissions to restrict access to these files. If sensitive information like credentials or secrets are leaked in the exposed configuration, they should be revoked and reset on the affected assets.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115079">https://www.tenable.com/plugins/was/115079</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Gladinet CentreStack / Triofox < 16.12.10420.56791 Hardcoded Credentials]]></title>
            <link>https://www.tenable.com/plugins/was/115078</link>
            <guid>https://www.tenable.com/plugins/was/115078</guid>
            <pubDate>Wed, 17 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115078 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Gladinet CentreStack / Triofox < 16.12.10420.56791 Hardcoded Credentials<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of Gladinet CentreStack / Triofox running on the remote host is prior to 16.12.10420.56791. It is, therefore, affected by an arbitrary local file inclusion due to the CentreStack / Triofox portal's use hardcoded values for their implementation of the AES cryptoscheme.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Gladinet CentreStack / Triofox version 16.12.10420.56791 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115078">https://www.tenable.com/plugins/was/115078</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Gladinet CentreStack < 16.4.10315.56368 Insecure Deserialization]]></title>
            <link>https://www.tenable.com/plugins/was/115077</link>
            <guid>https://www.tenable.com/plugins/was/115077</guid>
            <pubDate>Wed, 17 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115077 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Gladinet CentreStack < 16.4.10315.56368 Insecure Deserialization<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of Gladinet CentreStack running on the remote host is prior to 16.4.10315.56368. It is, therefore, affected by an Insecure Deserialization due to the CentreStack portal's use an hardcoded machineKey.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Gladinet CentreStack version 16.4.10315.56368 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115077">https://www.tenable.com/plugins/was/115077</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Gladinet Triofox < 16.7.10368.56560 Improper Access Control]]></title>
            <link>https://www.tenable.com/plugins/was/115076</link>
            <guid>https://www.tenable.com/plugins/was/115076</guid>
            <pubDate>Wed, 17 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115076 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Gladinet Triofox < 16.7.10368.56560 Improper Access Control<br /></span>
      <h3>Description</h3>
      <span>Gladinet Triofox version prior to 16.7.10368.56560 are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.<br /></span>
      <h3>Solution</h3>
      <span>Update to Gladinet Triofox version 16.7.10368.56560 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115076">https://www.tenable.com/plugins/was/115076</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[GeoServer < 2.25.6 / 2.26.x < 2.26.2 XML External Entity]]></title>
            <link>https://www.tenable.com/plugins/was/115075</link>
            <guid>https://www.tenable.com/plugins/was/115075</guid>
            <pubDate>Thu, 11 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115075 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>GeoServer < 2.25.6 / 2.26.x < 2.26.2 XML External Entity<br /></span>
      <h3>Description</h3>
      <span>GeoServer versions prior to < 2.25.6, 2.26.x < 2.26.2 are affected by an XML External Entity (XXE) vulnerability. An attacker could exploit this vulnerability by sending a specially crafted XML request to the GeoServer instance, which could lead to unauthorized access to sensitive data, server-side request forgery (SSRF), or denial of service (DoS) attacks.<br /></span>
      <h3>Solution</h3>
      <span>Update to GeoServer version 2.25.6 or 2.26.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115075">https://www.tenable.com/plugins/was/115075</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Drupal JSON:API User Enumeration]]></title>
            <link>https://www.tenable.com/plugins/was/115074</link>
            <guid>https://www.tenable.com/plugins/was/115074</guid>
            <pubDate>Thu, 11 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115074 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Drupal JSON:API User Enumeration<br /></span>
      <h3>Description</h3>
      <span>The remote Drupal site has the JSON:API module enabled. By default, this module may allow an unauthenticated, remote attacker to enumerate usernames by sending requests to the JSON:API endpoint. An attacker can leverage this information to conduct further attacks, such as brute-force password guessing.<br /></span>
      <h3>Solution</h3>
      <span>Disable the JSON:API module if is not required or restrict access to the user list with a module like 'JSON:API Permission Access' module or a similar access control module. You can also restrict access to the JSON:API endpoint at the web server level.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115074">https://www.tenable.com/plugins/was/115074</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tika < 3.2.2 XML External Entity]]></title>
            <link>https://www.tenable.com/plugins/was/115073</link>
            <guid>https://www.tenable.com/plugins/was/115073</guid>
            <pubDate>Thu, 11 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115073 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tika < 3.2.2 XML External Entity<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of Apache Tika running on the remote host is prior to 3.2.2. It is, therefore, affected by an XML External Entity (XXE) vulnerability via a crafted XFA file inside of a PDF.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Apache Tika version 3.2.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115073">https://www.tenable.com/plugins/was/115073</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Experience Manager (AEM) Forms Login Panel Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115072</link>
            <guid>https://www.tenable.com/plugins/was/115072</guid>
            <pubDate>Thu, 11 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115072 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe Experience Manager (AEM) Forms Login Panel Detected<br /></span>
      <h3>Description</h3>
      <span>This plugin detects the presence of the Adobe Experience Manager (AEM) Forms Login panel on a web application.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115072">https://www.tenable.com/plugins/was/115072</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache 2.4.x < 2.4.66 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115071</link>
            <guid>https://www.tenable.com/plugins/was/115071</guid>
            <pubDate>Mon, 08 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115071 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache 2.4.x < 2.4.66 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.66. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows with AllowEncodedSlashes On and MergeSlashes Off allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content. (CVE-2025-59775)<br /></span><span><br /></span><span>- A security bypass vulnerability exists involving the interaction between mod_userdir and suexec. Users with access to use the RequestHeader directive in .htaccess via AllowOverride FileInfo can bypass restrictions and cause some CGI scripts to run under an unexpected userid. (CVE-2025-66200)<br /></span><span><br /></span><span>- An integer overflow in mod_md (ACME) in Apache HTTP Server allows for unintended retry intervals. In the case of failed ACME certificate renewal, the backoff timer can become 0, causing attempts to renew the certificate to repeat without delays (infinite loop) until success. (CVE-2025-55753)<br /></span><span><br /></span><span>- A vulnerability in mod_cgid allows for the injection of query strings into command executions. Apache HTTP Server with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives. (CVE-2025-58098)<br /></span><span><br /></span><span>- Improper Neutralization of Escape, Meta, or Control Sequences in Apache HTTP Server allows environment variables set via the Apache configuration to unexpectedly supersede variables calculated by the server for CGI programs. (CVE-2025-65082) Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache version 2.4.66 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115071">https://www.tenable.com/plugins/was/115071</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Experience Manager (AEM) < 6.5.23.0 XML External Entity]]></title>
            <link>https://www.tenable.com/plugins/was/115070</link>
            <guid>https://www.tenable.com/plugins/was/115070</guid>
            <pubDate>Mon, 08 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115070 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe Experience Manager (AEM) < 6.5.23.0 XML External Entity<br /></span>
      <h3>Description</h3>
      <span>Adobe Experience Manager (AEM) versions prior to 6.5.23.0 are affected by an XML External Entity (XXE) vulnerability. An attacker could exploit this vulnerability by sending a specially crafted XML request to the affected system, which could lead to unauthorized access to sensitive information or system compromise.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Adobe Experience Manager version 6.5.23.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115070">https://www.tenable.com/plugins/was/115070</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[React Server Components 19.0 / 19.1.0 / 19.1.1 / 19.2.0 Remote Code Execution (React2Shell)]]></title>
            <link>https://www.tenable.com/plugins/was/115069</link>
            <guid>https://www.tenable.com/plugins/was/115069</guid>
            <pubDate>Thu, 04 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115069 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>React Server Components 19.0 / 19.1.0 / 19.1.1 / 19.2.0 Remote Code Execution (React2Shell)<br /></span>
      <h3>Description</h3>
      <span>React Server Components react-server-dom-webpack, react-server-dom-parcel, and react-server-dom-turbopack versions 19.0, 19.1.0, 19.1.1, and 19.2.0 are vulnerable to an Unauthenticated Remote Code Execution. An attacker can exploit a flaw in how React decodes payloads sent to React Server Function endpoints through specially crafted requests.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade the React Server Components to 19.0.1 or 19.1.2 or 19.2.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115069">https://www.tenable.com/plugins/was/115069</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Experience Manager (AEM) Groovy Console]]></title>
            <link>https://www.tenable.com/plugins/was/115068</link>
            <guid>https://www.tenable.com/plugins/was/115068</guid>
            <pubDate>Thu, 04 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115068 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe Experience Manager (AEM) Groovy Console<br /></span>
      <h3>Description</h3>
      <span>The remote Adobe Experience Manager (AEM) expose a Groovy console that allows users to execute arbitrary Groovy scripts on the server. This can lead to remote code execution and complete compromise of the AEM instance and the underlying server.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to the endpoint using a .htaccess file, limiting access to known IP Addresses<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115068">https://www.tenable.com/plugins/was/115068</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Experience Manager (AEM) Unauthenticated Cache Purge]]></title>
            <link>https://www.tenable.com/plugins/was/115067</link>
            <guid>https://www.tenable.com/plugins/was/115067</guid>
            <pubDate>Thu, 04 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115067 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe Experience Manager (AEM) Unauthenticated Cache Purge<br /></span>
      <h3>Description</h3>
      <span>This plugin detects the presence of the Adobe Experience Manager (AEM) Dispatcher cache purge functionality that is accessible without authentication. An unauthenticated cache purge can allow an attacker to clear cached content, leading to potential service disruption or performance degradation.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115067">https://www.tenable.com/plugins/was/115067</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Experience Manager (AEM) Merge Metadata Servlet Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115066</link>
            <guid>https://www.tenable.com/plugins/was/115066</guid>
            <pubDate>Thu, 04 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115066 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe Experience Manager (AEM) Merge Metadata Servlet Detected<br /></span>
      <h3>Description</h3>
      <span>This plugin detects the presence of the Adobe Experience Manager (AEM) Merge Metadata Servlet. The Merge Metadata Servlet is used to merge metadata from different sources within the AEM environment.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115066">https://www.tenable.com/plugins/was/115066</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Experience Manager (AEM) QueryBuilder JCR Hashed Password Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/115065</link>
            <guid>https://www.tenable.com/plugins/was/115065</guid>
            <pubDate>Thu, 04 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115065 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe Experience Manager (AEM) QueryBuilder JCR Hashed Password Disclosure<br /></span>
      <h3>Description</h3>
      <span>The remote Adobe Experience Manager (AEM) QueryBuilder Servlet is prone to an information disclosure vulnerability. An unauthenticated attacker can exploit this issue to retrieve the hashed passwords of users in the AEM instance by sending a specially crafted HTTP request to the QueryBuilder Servlet endpoint.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to the endpoint using a .htaccess file, limiting access to known IP Addresses<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115065">https://www.tenable.com/plugins/was/115065</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Experience Manager (AEM) QueryBuilder JCR Role Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/115064</link>
            <guid>https://www.tenable.com/plugins/was/115064</guid>
            <pubDate>Thu, 04 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115064 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe Experience Manager (AEM) QueryBuilder JCR Role Disclosure<br /></span>
      <h3>Description</h3>
      <span>The remote Adobe Experience Manager (AEM) QueryBuilder Servlet is prone to an information disclosure vulnerability. An unauthenticated attacker can exploit this issue to retrieve the JCR roles of the AEM instance by sending a specially crafted HTTP request to the QueryBuilder Servlet endpoint.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to the endpoint using a .htaccess file, limiting access to known IP Addresses<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115064">https://www.tenable.com/plugins/was/115064</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AI Service Secret Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/115063</link>
            <guid>https://www.tenable.com/plugins/was/115063</guid>
            <pubDate>Thu, 04 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115063 with High Severity</p>
      <h3>Synopsis</h3>
      <span>AI Service Secret Disclosure<br /></span>
      <h3>Description</h3>
      <span>Most of the web applications rely on various public services to provide features to their users. In secure designs, consuming these private or cloud services will require authentication like API and private keys, username and password based credentials and similar sensitive data.<br /></span><span><br /></span><span>Developers sometimes hard code such data in various places of their applications, without realizing that it could become publicly available in client-side JavaScript or, for example, HTML comments. By leveraging these sensitive information, a remote and unauthenticated attacker could gain access to an external AI service used by the web application and the organization.<br /></span>
      <h3>Solution</h3>
      <span>Remove the secret exposure by identifying the root cause of the issue (for example manual data insertion in the code, environment variables being bundled in front-end JavaScript). Rotate the secrets to avoid further reuse in case it has been previously retrieved by a malicious actor.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115063">https://www.tenable.com/plugins/was/115063</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Third-Party Service Secret Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/115062</link>
            <guid>https://www.tenable.com/plugins/was/115062</guid>
            <pubDate>Thu, 04 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115062 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Third-Party Service Secret Disclosure<br /></span>
      <h3>Description</h3>
      <span>Most of the web applications rely on various public services to provide features to their users. In secure designs, consuming these private or cloud services will require authentication like API and private keys, username and password based credentials and similar sensitive data.<br /></span><span><br /></span><span>Developers sometimes hard code such data in various places of their applications, without realizing that it could become publicly available in client-side JavaScript or, for example, HTML comments. By leveraging these sensitive information, a remote and unauthenticated attacker could gain access to an external AI service used by the web application and the organization.<br /></span>
      <h3>Solution</h3>
      <span>Remove the secret exposure by identifying the root cause of the issue (for example manual data insertion in the code, environment variables being bundled in front-end JavaScript). Rotate the secrets to avoid further reuse in case it has been previously retrieved by a malicious actor.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115062">https://www.tenable.com/plugins/was/115062</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Experience Manager (AEM) Dispatcher Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/115061</link>
            <guid>https://www.tenable.com/plugins/was/115061</guid>
            <pubDate>Thu, 04 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115061 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe Experience Manager (AEM) Dispatcher Bypass<br /></span>
      <h3>Description</h3>
      <span>The remote Adobe Experience Manager (AEM) is affected by a dispatcher misconfiguration that allows for security filter bypass. By sending a specially crafted request, an unauthenticated, remote attacker can access internal endpoints, such as the QueryBuilder JSON API. A successful exploit could lead to unauthorized access and information disclosure).<br /></span>
      <h3>Solution</h3>
      <span>It is recommended to review and strengthen the AEM Dispatcher's filter rules to follow a 'deny by default' approach. Ensure that access to sensitive administrative and internal endpoints, such as `/bin/querybuilder.json`, is explicitly denied. Consult the Adobe Experience Manager Dispatcher Security Checklist for comprehensive guidance on securing the dispatcher configuration.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115061">https://www.tenable.com/plugins/was/115061</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Experience Manager (AEM) CRX Content Explorer]]></title>
            <link>https://www.tenable.com/plugins/was/115060</link>
            <guid>https://www.tenable.com/plugins/was/115060</guid>
            <pubDate>Thu, 04 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115060 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe Experience Manager (AEM) CRX Content Explorer<br /></span>
      <h3>Description</h3>
      <span>This plugin detects the presence of the Adobe Experience Manager (AEM) CRX Content Explorer interface. The CRX Content Explorer is a web-based interface used to manage and interact with the content repository of Adobe Experience Manager.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115060">https://www.tenable.com/plugins/was/115060</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Experience Manager (AEM) Felix Console Default Credentials]]></title>
            <link>https://www.tenable.com/plugins/was/115059</link>
            <guid>https://www.tenable.com/plugins/was/115059</guid>
            <pubDate>Thu, 04 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115059 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe Experience Manager (AEM) Felix Console Default Credentials<br /></span>
      <h3>Description</h3>
      <span>The remote Adobe Experience Manager (AEM) Felix Console is configured with default or predictable credentials, which could allow an attacker to gain unauthorized access to the application and potentially compromise the underlying system.<br /></span>
      <h3>Solution</h3>
      <span>The application should not be configured with accounts using default or predictable credentials. A complex password policy should be defined and enforced on every account available in the application to prevent attackers from guessing it and have unauthorized access to the application.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115059">https://www.tenable.com/plugins/was/115059</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Experience Manager (AEM) Debugging Client Libraries Exposure]]></title>
            <link>https://www.tenable.com/plugins/was/115058</link>
            <guid>https://www.tenable.com/plugins/was/115058</guid>
            <pubDate>Thu, 04 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115058 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe Experience Manager (AEM) Debugging Client Libraries Exposure<br /></span>
      <h3>Description</h3>
      <span>This plugin detects the presence of the Adobe Experience Manager (AEM) Debugging Client Libraries on a web server. These libraries are intended for development and debugging purposes and should not be exposed in a production environment, as they may contain sensitive information or functionality that could be exploited by attackers.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115058">https://www.tenable.com/plugins/was/115058</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Experience Manager (AEM) Querybuilder Internal Path Read]]></title>
            <link>https://www.tenable.com/plugins/was/115057</link>
            <guid>https://www.tenable.com/plugins/was/115057</guid>
            <pubDate>Thu, 04 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115057 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe Experience Manager (AEM) Querybuilder Internal Path Read<br /></span>
      <h3>Description</h3>
      <span>The remote Adobe Experience Manager (AEM) server is configured to allow unauthenticated users to access internal paths using the Querybuilder endpoint. This may allow an attacker to read sensitive files from the server.<br /></span><span><br /></span><span>The Querybuilder endpoint is typically located at /bin/querybuilder.json and allows users to perform searches on the AEM repository. By specifying certain parameters, an attacker can potentially access internal paths that should not be publicly accessible.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to the endpoint using a .htaccess file, limiting access to known IP Addresses<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115057">https://www.tenable.com/plugins/was/115057</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Experience Manager (AEM) Sling User Information Servlet Exposure]]></title>
            <link>https://www.tenable.com/plugins/was/115056</link>
            <guid>https://www.tenable.com/plugins/was/115056</guid>
            <pubDate>Thu, 04 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115056 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe Experience Manager (AEM) Sling User Information Servlet Exposure<br /></span>
      <h3>Description</h3>
      <span>The remote Adobe Experience Manager (AEM) Sling User Information Servlet is prone to information disclosure vulnerabilities. An attacker can exploit this issue to gather information about user accounts, including usernames and other details, which could be used in subsequent attacks such as brute-force password guessing or social engineering.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to the endpoint using a .htaccess file, limiting access to known IP Addresses<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115056">https://www.tenable.com/plugins/was/115056</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Experience Manager (AEM) CRX Search Endpoint Exposure]]></title>
            <link>https://www.tenable.com/plugins/was/115055</link>
            <guid>https://www.tenable.com/plugins/was/115055</guid>
            <pubDate>Thu, 04 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115055 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe Experience Manager (AEM) CRX Search Endpoint Exposure<br /></span>
      <h3>Description</h3>
      <span>The remote Adobe Experience Manager (AEM) CRX search endpoint is accessible. These endpoints provide potential attackers with access to search functionalities, which could be exploited to discover sensitive internal resources.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to the endpoint using a .htaccess file, limiting access to known IP Addresses<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115055">https://www.tenable.com/plugins/was/115055</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Experience Manager (AEM) Custom Scripts Listing Detection]]></title>
            <link>https://www.tenable.com/plugins/was/115054</link>
            <guid>https://www.tenable.com/plugins/was/115054</guid>
            <pubDate>Thu, 04 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115054 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe Experience Manager (AEM) Custom Scripts Listing Detection<br /></span>
      <h3>Description</h3>
      <span>The remote Adobe Experience Manager (AEM) instance allows for the listing of custom scripts. An unauthenticated, remote attacker can exploit this to enumerate custom scripts, which could lead to information disclosure about the application.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to the endpoint using a .htaccess file, limiting access to known IP Addresses<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115054">https://www.tenable.com/plugins/was/115054</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Experience Manager (AEM) QueryBuilder Feed Servlet Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115053</link>
            <guid>https://www.tenable.com/plugins/was/115053</guid>
            <pubDate>Thu, 04 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115053 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe Experience Manager (AEM) QueryBuilder Feed Servlet Detected<br /></span>
      <h3>Description</h3>
      <span>This plugin detects the presence of the Adobe Experience Manager (AEM) QueryBuilder Feed Servlet on a web application. The QueryBuilder Feed Servlet is part of AEM's QueryBuilder API, which allows developers to construct and execute queries against the AEM repository to retrieve content based on specific criteria.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115053">https://www.tenable.com/plugins/was/115053</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Experience Manager (AEM) CRX Namespace Editor Panel Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115052</link>
            <guid>https://www.tenable.com/plugins/was/115052</guid>
            <pubDate>Thu, 04 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115052 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe Experience Manager (AEM) CRX Namespace Editor Panel Detected<br /></span>
      <h3>Description</h3>
      <span>This plugin detects the presence of the Adobe Experience Manager (AEM) CRX Namespace Editor panel on a web application. The CRX Namespace Editor panel is part of the AEM's content repository management interface, allowing administrators to manage namespaces and node types within the repository. Unauthorized access to this panel can lead to potential security risks, including unauthorized modifications to the content repository structure.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to administrative functionality using a .htaccess file, limiting access to known IP Addresses.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115052">https://www.tenable.com/plugins/was/115052</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Sneeit Framework Plugin for WordPress < 8.4 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/115051</link>
            <guid>https://www.tenable.com/plugins/was/115051</guid>
            <pubDate>Thu, 04 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115051 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Sneeit Framework Plugin for WordPress < 8.4 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>The WordPress Sneeit Framework Plugin installed on the remote host is affected by a Remote Code Execution vulnerability due to insufficient input validation in the sneeit_articles_pagination_callback() function, which accepts user input and passes it through the call_user_func() function. This allows unauthenticated attackers to execute arbitrary code on the server.<br /></span>
      <h3>Solution</h3>
      <span>Update to Sneeit Framework Plugin for WordPress version 8.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115051">https://www.tenable.com/plugins/was/115051</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Experience Manager (AEM) Sling Login Panel Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115050</link>
            <guid>https://www.tenable.com/plugins/was/115050</guid>
            <pubDate>Thu, 04 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115050 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe Experience Manager (AEM) Sling Login Panel Detected<br /></span>
      <h3>Description</h3>
      <span>This plugin detects the presence of the Adobe Experience Manager (AEM) Sling Login panel on a web application. The Sling Login panel is part of the Apache Sling framework used by AEM for content delivery and management, providing authentication and access control features.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115050">https://www.tenable.com/plugins/was/115050</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Experience Manager (AEM) CRX Package Manager Panel Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115049</link>
            <guid>https://www.tenable.com/plugins/was/115049</guid>
            <pubDate>Thu, 04 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115049 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe Experience Manager (AEM) CRX Package Manager Panel Detected<br /></span>
      <h3>Description</h3>
      <span>This plugin detects the presence of the Adobe Experience Manager (AEM) CRX Package Manager panel on a web application. The CRX Package Manager is a tool used to manage packages in AEM, allowing users to install, uninstall, and manage content packages.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115049">https://www.tenable.com/plugins/was/115049</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Experience Manager (AEM) Login Panel Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115048</link>
            <guid>https://www.tenable.com/plugins/was/115048</guid>
            <pubDate>Thu, 04 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115048 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe Experience Manager (AEM) Login Panel Detected<br /></span>
      <h3>Description</h3>
      <span>This plugin detects the presence of the Adobe Experience Manager (AEM) login panel on a web application. AEM is a comprehensive content management solution for building websites, mobile apps, and forms.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115048">https://www.tenable.com/plugins/was/115048</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[GFI KerioControl < 9.4.5 HTTP Response Splitting]]></title>
            <link>https://www.tenable.com/plugins/was/115047</link>
            <guid>https://www.tenable.com/plugins/was/115047</guid>
            <pubDate>Thu, 04 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115047 with High Severity</p>
      <h3>Synopsis</h3>
      <span>GFI KerioControl < 9.4.5 HTTP Response Splitting<br /></span>
      <h3>Description</h3>
      <span>GFI KerioControl version prior to 9.4.5 is affected by an HTTP Response Splitting vulnerability. Due to a not properly sanitized GET parameter used to generate a Location HTTP header in a 302 HTTP response an attacker can exploit this vulnerability to perform an Open Redirect or HTTP Response Splitting attacks, which in turn lead to Reflected Cross-Site Scripting (XSS).<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to GFI KerioControl version 9.4.5 Patch 1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115047">https://www.tenable.com/plugins/was/115047</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Liferay Portal GraphQL Schema Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115046</link>
            <guid>https://www.tenable.com/plugins/was/115046</guid>
            <pubDate>Mon, 24 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115046 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Liferay Portal GraphQL Schema Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected that the target Liferay instance publicly exposes its GraphQL schema.<br /></span>
      <h3>Solution</h3>
      <span>If the GraphQL schema is not expected to be public, restrict their access.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115046">https://www.tenable.com/plugins/was/115046</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Oracle Identity Manager < 12.2.1.4.0 / < 14.1.2.1.0 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/115045</link>
            <guid>https://www.tenable.com/plugins/was/115045</guid>
            <pubDate>Mon, 24 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115045 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Oracle Identity Manager < 12.2.1.4.0 / < 14.1.2.1.0 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>Oracle Identity Manager versions prior to 12.2.1.4.0 or prior to 14.1.2.1.0 are vulnerable to a Remote Code Execution through the REST WebServices component. An unauthenticated attacker can achieve remote code execution on the underlying server via a crafted REST request.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Oracle Identity Manager version 12.2.1.4.0 or 14.1.2.1.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115045">https://www.tenable.com/plugins/was/115045</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Liferay Portal License Manager Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115044</link>
            <guid>https://www.tenable.com/plugins/was/115044</guid>
            <pubDate>Mon, 24 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115044 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Liferay Portal License Manager Detected<br /></span>
      <h3>Description</h3>
      <span>The target Liferay portal instance exposes information about the license state and the server. An unauthenticated attacked could leverage these information, such as server internal IP addresse and hostname, liferay version and license owner to conduct further attacks.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the license manager route is not publicly accessible or restrict access to authorized users only.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115044">https://www.tenable.com/plugins/was/115044</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Liferay Portal JSON Web Services Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115043</link>
            <guid>https://www.tenable.com/plugins/was/115043</guid>
            <pubDate>Mon, 24 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115043 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Liferay Portal JSON Web Services Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected that the target Liferay instance publicly exposes the JSON web services.<br /></span>
      <h3>Solution</h3>
      <span>If the JSON web services are not expected to be public, restrict their access.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115043">https://www.tenable.com/plugins/was/115043</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Wazuh 4.4x < 4.9.1 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/115042</link>
            <guid>https://www.tenable.com/plugins/was/115042</guid>
            <pubDate>Mon, 24 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115042 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Wazuh 4.4x < 4.9.1 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>According to the self-reported version in its response header, the version of Wazuh hosted on the remote web server is 4.4.x prior to 4.9.1. It is, therefore, affected by a Remote Code Execution through an unsafe deserialization by anybody with API access.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Wazuh version 4.9.1 Patch Level 1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115042">https://www.tenable.com/plugins/was/115042</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Liferay Portal API Explorer Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115041</link>
            <guid>https://www.tenable.com/plugins/was/115041</guid>
            <pubDate>Mon, 24 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115041 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Liferay Portal API Explorer Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected that the target Liferay instance publicly expose the API explorer.<br /></span>
      <h3>Solution</h3>
      <span>If the API explorer is not expected to public, restrict its access.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115041">https://www.tenable.com/plugins/was/115041</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Lucee 5.4.x < 5.4.3.2 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/115039</link>
            <guid>https://www.tenable.com/plugins/was/115039</guid>
            <pubDate>Mon, 17 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115039 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Lucee 5.4.x < 5.4.3.2 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, Lodash is prior to 5.3.12.1 or 5.4.x prior to 5.4.3.2. It is, therefore, affected by a Remote Code Execution via an XML XXE attack in the Lucee REST endpoint.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Lucee version 5.4.3.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115039">https://www.tenable.com/plugins/was/115039</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Lucee < 5.3.12.1 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/115038</link>
            <guid>https://www.tenable.com/plugins/was/115038</guid>
            <pubDate>Mon, 17 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115038 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Lucee < 5.3.12.1 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, Lodash is prior to 5.3.12.1 or 5.4.x prior to 5.4.3.2. It is, therefore, affected by a Remote Code Execution via an XML XXE attack in the Lucee REST endpoint.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Lucee version 5.3.12.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115038">https://www.tenable.com/plugins/was/115038</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Telerik UI for ASP.NET AJAX Unsafe Reflection]]></title>
            <link>https://www.tenable.com/plugins/was/115037</link>
            <guid>https://www.tenable.com/plugins/was/115037</guid>
            <pubDate>Mon, 17 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115037 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Telerik UI for ASP.NET AJAX Unsafe Reflection<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the version of Telerik UI for ASP.NET AJAX is affected by an unsafe reflection vulnerability resulting in denial of service and advanced attacks scenarios.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Telerik UI for ASP.NET AJAX version 2025 Q1 SP2 (2025.1.416) or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115037">https://www.tenable.com/plugins/was/115037</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Drupal 8.0.x < 10.4.9 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115036</link>
            <guid>https://www.tenable.com/plugins/was/115036</guid>
            <pubDate>Mon, 17 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115036 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Drupal 8.0.x < 10.4.9 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected Drupal application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - Drupal Core has a rarely used feature, provided by an underlying library, which allows certain attributes of incoming HTTP requests to be overridden.<br /></span><span><br /></span><span> - Drupal core contains a chain of methods that is exploitable when an insecure deserialization vulnerability exists on the site.<br /></span><span><br /></span><span> - By generating and tricking a user into visiting a malicious URL, an attacker can perform site defacement.<br /></span><span><br /></span><span> - The core system module handles downloads of private and temporary files.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Drupal version 10.4.9 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115036">https://www.tenable.com/plugins/was/115036</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Drupal 10.5.x < 10.5.6 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115035</link>
            <guid>https://www.tenable.com/plugins/was/115035</guid>
            <pubDate>Mon, 17 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115035 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Drupal 10.5.x < 10.5.6 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected Drupal application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - Drupal Core has a rarely used feature, provided by an underlying library, which allows certain attributes of incoming HTTP requests to be overridden.<br /></span><span><br /></span><span> - Drupal core contains a chain of methods that is exploitable when an insecure deserialization vulnerability exists on the site.<br /></span><span><br /></span><span> - By generating and tricking a user into visiting a malicious URL, an attacker can perform site defacement.<br /></span><span><br /></span><span> - The core system module handles downloads of private and temporary files.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Drupal version 10.5.6 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115035">https://www.tenable.com/plugins/was/115035</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Drupal 11.0.x < 11.1.9 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115034</link>
            <guid>https://www.tenable.com/plugins/was/115034</guid>
            <pubDate>Mon, 17 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115034 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Drupal 11.0.x < 11.1.9 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected Drupal application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - Drupal Core has a rarely used feature, provided by an underlying library, which allows certain attributes of incoming HTTP requests to be overridden.<br /></span><span><br /></span><span> - Drupal core contains a chain of methods that is exploitable when an insecure deserialization vulnerability exists on the site.<br /></span><span><br /></span><span> - By generating and tricking a user into visiting a malicious URL, an attacker can perform site defacement.<br /></span><span><br /></span><span> - The core system module handles downloads of private and temporary files.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Drupal version 11.1.9 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115034">https://www.tenable.com/plugins/was/115034</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Drupal 11.2.x < 11.2.8 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115033</link>
            <guid>https://www.tenable.com/plugins/was/115033</guid>
            <pubDate>Mon, 17 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115033 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Drupal 11.2.x < 11.2.8 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected Drupal application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - Drupal Core has a rarely used feature, provided by an underlying library, which allows certain attributes of incoming HTTP requests to be overridden.<br /></span><span><br /></span><span> - Drupal core contains a chain of methods that is exploitable when an insecure deserialization vulnerability exists on the site.<br /></span><span><br /></span><span> - By generating and tricking a user into visiting a malicious URL, an attacker can perform site defacement.<br /></span><span><br /></span><span> - The core system module handles downloads of private and temporary files.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Drupal version 11.2.8 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115033">https://www.tenable.com/plugins/was/115033</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Lucee < 6.0.1.59 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/115032</link>
            <guid>https://www.tenable.com/plugins/was/115032</guid>
            <pubDate>Mon, 17 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115032 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Lucee < 6.0.1.59 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>Lucee versions prior to 6.0.1.59 are vulnerable to Remote Code Execution (RCE) via crafted cookies. An attacker can exploit this vulnerability by sending a specially crafted cookie to the server, which can lead to arbitrary code execution on the server hosting the Lucee application.<br /></span>
      <h3>Solution</h3>
      <span>Update to Lucee version 6.0.1.59 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115032">https://www.tenable.com/plugins/was/115032</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fortinet FortiWeb Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/115040</link>
            <guid>https://www.tenable.com/plugins/was/115040</guid>
            <pubDate>Fri, 14 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115040 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Fortinet FortiWeb Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>Fortinet FortiWeb versions 7.0.x < 7.0.12, 7.2.x < 7.2.12, 7.4.x < 7.4.10, 7.6.x < 7.6.5, 8.0.x < 8.0.2 suffer from an authentication bypass vulnerability. By crafting a specific request, a remote and unauthenticated attacker can create a new user account and compromise the affected system.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to FortiWeb version 7.0.12, 7.2.12, 7.4.10, 7.6.5, 8.0.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115040">https://www.tenable.com/plugins/was/115040</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Lucee Unset Credentials]]></title>
            <link>https://www.tenable.com/plugins/was/155029</link>
            <guid>https://www.tenable.com/plugins/was/155029</guid>
            <pubDate>Mon, 10 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 155029 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Lucee Unset Credentials<br /></span>
      <h3>Description</h3>
      <span>Lucee web application server may be configured with no credentials. If an attacker setup the default accounts, they could gain unauthorized access to the application and perform arbitrary actions on it.<br /></span>
      <h3>Solution</h3>
      <span>The application should not be configured with accounts using default or predictable credentials. A complex password policy should be defined and enforced on every account available in the application to prevent attackers from guessing it and have unauthorized access to the application.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/155029">https://www.tenable.com/plugins/was/155029</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[DotNetNuke < 10.1.1 Unrestricted File Upload]]></title>
            <link>https://www.tenable.com/plugins/was/115031</link>
            <guid>https://www.tenable.com/plugins/was/115031</guid>
            <pubDate>Mon, 10 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115031 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>DotNetNuke < 10.1.1 Unrestricted File Upload<br /></span>
      <h3>Description</h3>
      <span>DotNetNuke CMS versions prior to 10.1.1 are affected by an unrestricted file upload vulnerability due to improper validation of uploaded files in the default HTML editor provider. This vulnerability allows unauthenticated users to upload files without proper restrictions, potentially leading to overwriting existing files on the server.<br /></span><span><br /></span><span>An attacker could exploit this vulnerability by uploading malicious files, which could lead to website defacement or, when combined with other vulnerabilities, the execution of cross-site scripting (XSS) payloads.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to DNN Platform 10.1.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115031">https://www.tenable.com/plugins/was/115031</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Gladinet CentreStack/Triofox < 16.10.10408.56683 Local File Inclusion]]></title>
            <link>https://www.tenable.com/plugins/was/115030</link>
            <guid>https://www.tenable.com/plugins/was/115030</guid>
            <pubDate>Mon, 10 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115030 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Gladinet CentreStack/Triofox < 16.10.10408.56683 Local File Inclusion<br /></span>
      <h3>Description</h3>
      <span>Gladinet CentreStack/Triofox versions prior to 16.10.10408.56683 are vulnerable to a Local File Inclusion (LFI) vulnerability. An unauthenticated attacker could exploit this issue to read arbitrary files on the affected system, potentially leading to information disclosure.<br /></span><span><br /></span><span>The vulnerability exists due to insufficient validation of user-supplied input in the file inclusion functionality. An attacker could manipulate the input to include files from the local file system, such as configuration files or sensitive data.<br /></span><span><br /></span><span>Successful exploitation of this vulnerability could allow an attacker to gain access to sensitive information, which could be used for further attacks against the system or network.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Gladinet CentreStack/Triofox version 16.10.10408.56683 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115030">https://www.tenable.com/plugins/was/115030</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Lucee Unset Credentials]]></title>
            <link>https://www.tenable.com/plugins/was/115029</link>
            <guid>https://www.tenable.com/plugins/was/115029</guid>
            <pubDate>Mon, 10 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115029 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Lucee Unset Credentials<br /></span>
      <h3>Description</h3>
      <span>Lucee web application server may be configured with no credentials. If an attacker setup the default accounts, they could gain unauthorized access to the application and perform arbitrary actions on it.<br /></span>
      <h3>Solution</h3>
      <span>The application should not be configured with accounts using default or predictable credentials. A complex password policy should be defined and enforced on every account available in the application to prevent attackers from guessing it and have unauthorized access to the application.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115029">https://www.tenable.com/plugins/was/115029</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Lucee Default Credentials]]></title>
            <link>https://www.tenable.com/plugins/was/115028</link>
            <guid>https://www.tenable.com/plugins/was/115028</guid>
            <pubDate>Mon, 10 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115028 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Lucee Default Credentials<br /></span>
      <h3>Description</h3>
      <span>Lucee web application server may be configured with default or predictable credentials for its accounts. If an attacker can guess the credentials, they may be able to gain unauthorized access to the application and perform arbitrary actions on it.<br /></span>
      <h3>Solution</h3>
      <span>The application should not be configured with accounts using default or predictable credentials. A complex password policy should be defined and enforced on every account available in the application to prevent attackers from guessing it and have unauthorized access to the application.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115028">https://www.tenable.com/plugins/was/115028</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Lucee Administration Panel Login Form Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115027</link>
            <guid>https://www.tenable.com/plugins/was/115027</guid>
            <pubDate>Mon, 10 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115027 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Lucee Administration Panel Login Form Detected<br /></span>
      <h3>Description</h3>
      <span>Lucee Administration Panel has been detected on the target web application.<br /></span><span><br /></span><span>This may present an attacker with an exploit vector which could be leveraged using other techniques, such as a Brute-Force or Dictionary Attack, allowing an attacker to gain access to administrative functionality.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to administrative functionality using a .htaccess file, limiting access to known IP Addresses.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115027">https://www.tenable.com/plugins/was/115027</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 9.0.0-M1 < 9.0.109 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115026</link>
            <guid>https://www.tenable.com/plugins/was/115026</guid>
            <pubDate>Tue, 04 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115026 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 9.0.0-M1 < 9.0.109 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.109, 10.1.0-M1 prior to 10.1.45 or 11.0.0-M1 prior to 11.0.11. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - Console manipulation via escape sequences in log messages. (CVE-2025-55754)<br /></span><span><br /></span><span> - Directory traversal via Rewrite Valve with possible remote code execution if PUT is enabled. (CVE-2025-55752)<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.109 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115026">https://www.tenable.com/plugins/was/115026</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 10.1.0-M1 < 10.1.45 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115025</link>
            <guid>https://www.tenable.com/plugins/was/115025</guid>
            <pubDate>Tue, 04 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115025 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 10.1.0-M1 < 10.1.45 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.109, 10.1.0-M1 prior to 10.1.45 or 11.0.0-M1 prior to 11.0.11. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - Console manipulation via escape sequences in log messages. (CVE-2025-55754)<br /></span><span><br /></span><span> - Directory traversal via Rewrite Valve with possible remote code execution if PUT is enabled. (CVE-2025-55752)<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.45 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115025">https://www.tenable.com/plugins/was/115025</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 11.0.0-M1 < 11.0.11 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115024</link>
            <guid>https://www.tenable.com/plugins/was/115024</guid>
            <pubDate>Tue, 04 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115024 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 11.0.0-M1 < 11.0.11 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.109, 10.1.0-M1 prior to 10.1.45 or 11.0.0-M1 prior to 11.0.11. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - Console manipulation via escape sequences in log messages. (CVE-2025-55754)<br /></span><span><br /></span><span> - Directory traversal via Rewrite Valve with possible remote code execution if PUT is enabled. (CVE-2025-55752)<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 11.0.11 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115024">https://www.tenable.com/plugins/was/115024</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 9.0.0-M1 < 9.0.110 Denial of Service]]></title>
            <link>https://www.tenable.com/plugins/was/115023</link>
            <guid>https://www.tenable.com/plugins/was/115023</guid>
            <pubDate>Tue, 04 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115023 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 9.0.0-M1 < 9.0.110 Denial of Service<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.110, 10.1.0-M1 prior to 10.1.47 or 11.0.0-M1 prior to 11.0.12. It is, therefore, affected by a denial of service vulnerability due to delayed cleaning of multipart upload temporary files.<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.110 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115023">https://www.tenable.com/plugins/was/115023</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 10.1.0-M1 < 10.1.47 Denial of Service]]></title>
            <link>https://www.tenable.com/plugins/was/115022</link>
            <guid>https://www.tenable.com/plugins/was/115022</guid>
            <pubDate>Tue, 04 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115022 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 10.1.0-M1 < 10.1.47 Denial of Service<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.110, 10.1.0-M1 prior to 10.1.47 or 11.0.0-M1 prior to 11.0.12. It is, therefore, affected by a denial of service vulnerability due to delayed cleaning of multipart upload temporary files.<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.47 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115022">https://www.tenable.com/plugins/was/115022</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 11.0.0-M1 < 11.0.12 Denial of Service]]></title>
            <link>https://www.tenable.com/plugins/was/115021</link>
            <guid>https://www.tenable.com/plugins/was/115021</guid>
            <pubDate>Tue, 04 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115021 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 11.0.0-M1 < 11.0.12 Denial of Service<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.110, 10.1.0-M1 prior to 10.1.47 or 11.0.0-M1 prior to 11.0.12. It is, therefore, affected by a denial of service vulnerability due to delayed cleaning of multipart upload temporary files.<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 11.0.12 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115021">https://www.tenable.com/plugins/was/115021</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Squid < 7.2 Information Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/115020</link>
            <guid>https://www.tenable.com/plugins/was/115020</guid>
            <pubDate>Tue, 04 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115020 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Squid < 7.2 Information Disclosure<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number,the version of Squid installed on the remote host is prior to 7.2. It is, therefore, affected by an Information Disclosure due to a failure to redact HTTP Authentication credentials.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Squid version 7.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115020">https://www.tenable.com/plugins/was/115020</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Commerce / Magento Insecure Deserialization (SessionReaper)]]></title>
            <link>https://www.tenable.com/plugins/was/115019</link>
            <guid>https://www.tenable.com/plugins/was/115019</guid>
            <pubDate>Fri, 24 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115019 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe Commerce / Magento Insecure Deserialization (SessionReaper)<br /></span>
      <h3>Description</h3>
      <span>Adobe Magento Open Source / Commerce is prone to an unauthenticated Remote Code Execution vulnerability due to insecure deserialization of untrusted data. An attacker can exploit this issue to execute arbitrary code in the context of the web server process.<br /></span>
      <h3>Solution</h3>
      <span>Apply the appropriate patch according to the vendor advisory.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115019">https://www.tenable.com/plugins/was/115019</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 10.x < 10.0.2 Denial of Service]]></title>
            <link>https://www.tenable.com/plugins/was/115018</link>
            <guid>https://www.tenable.com/plugins/was/115018</guid>
            <pubDate>Fri, 24 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115018 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 10.x < 10.0.2 Denial of Service<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is 2.x prior to 8.5.25, 9.2.x prior to 9.2.7 or 10.x prior to 10.0.2. It is, therefore, affected by a denial of service vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 10.0.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115018">https://www.tenable.com/plugins/was/115018</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 9.2.x < 9.2.7 Denial of Service]]></title>
            <link>https://www.tenable.com/plugins/was/115017</link>
            <guid>https://www.tenable.com/plugins/was/115017</guid>
            <pubDate>Fri, 24 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115017 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 9.2.x < 9.2.7 Denial of Service<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is 2.x prior to 8.5.25, 9.2.x prior to 9.2.7 or 10.x prior to 10.0.2. It is, therefore, affected by a denial of service vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 9.2.7 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115017">https://www.tenable.com/plugins/was/115017</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 2.x < 8.5.25 Denial of Service]]></title>
            <link>https://www.tenable.com/plugins/was/115016</link>
            <guid>https://www.tenable.com/plugins/was/115016</guid>
            <pubDate>Fri, 24 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115016 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 2.x < 8.5.25 Denial of Service<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is 2.x prior to 8.5.25, 9.2.x prior to 9.2.7 or 10.x prior to 10.0.2. It is, therefore, affected by a denial of service vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 8.5.25 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115016">https://www.tenable.com/plugins/was/115016</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Jira 11.x < 11.1.0 Path Traversal]]></title>
            <link>https://www.tenable.com/plugins/was/115015</link>
            <guid>https://www.tenable.com/plugins/was/115015</guid>
            <pubDate>Fri, 24 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115015 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Jira 11.x < 11.1.0 Path Traversal<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Jira application running on the remote host is 9.12.x prior to 9.12.28, 10.3.x prior to 10.3.12 or 11.x prior to 11.1.0. It is, therefore, affected by a path traversal vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Jira version 11.1.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115015">https://www.tenable.com/plugins/was/115015</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Jira 10.3.x < 10.3.12 Path Traversal]]></title>
            <link>https://www.tenable.com/plugins/was/115014</link>
            <guid>https://www.tenable.com/plugins/was/115014</guid>
            <pubDate>Fri, 24 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115014 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Jira 10.3.x < 10.3.12 Path Traversal<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Jira application running on the remote host is 9.12.x prior to 9.12.28, 10.3.x prior to 10.3.12 or 11.x prior to 11.1.0. It is, therefore, affected by a path traversal vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Jira version 10.3.12 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115014">https://www.tenable.com/plugins/was/115014</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Jira 9.12.x < 9.12.28 Path Traversal]]></title>
            <link>https://www.tenable.com/plugins/was/115013</link>
            <guid>https://www.tenable.com/plugins/was/115013</guid>
            <pubDate>Fri, 24 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115013 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Jira 9.12.x < 9.12.28 Path Traversal<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Jira application running on the remote host is 9.12.x prior to 9.12.28, 10.3.x prior to 10.3.12 or 11.x prior to 11.1.0. It is, therefore, affected by a path traversal vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Jira version 9.12.28 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115013">https://www.tenable.com/plugins/was/115013</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Authentik 2024.8.x < 2024.8.3 Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/115012</link>
            <guid>https://www.tenable.com/plugins/was/115012</guid>
            <pubDate>Fri, 24 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115012 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Authentik 2024.8.x < 2024.8.3 Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of Authentik running on the remote host is prior to 2024.6.5 or 2024.8.x prior to 2024.8.3. It is, therefore, affected by an Authentication Bypass vulnerability via the X-Forwarded-For header.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Authentik version 2024.6.5 or 2024.8.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115012">https://www.tenable.com/plugins/was/115012</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Authentik < 2024.6.5 Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/115011</link>
            <guid>https://www.tenable.com/plugins/was/115011</guid>
            <pubDate>Fri, 24 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115011 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Authentik < 2024.6.5 Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of Authentik running on the remote host is prior to 2024.6.5 or 2024.8.x prior to 2024.8.3. It is, therefore, affected by an Authentication Bypass vulnerability via the X-Forwarded-For header.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Authentik version 2024.6.5 or 2024.8.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115011">https://www.tenable.com/plugins/was/115011</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Object-Relational Mapping (ORM) Leak]]></title>
            <link>https://www.tenable.com/plugins/was/115010</link>
            <guid>https://www.tenable.com/plugins/was/115010</guid>
            <pubDate>Tue, 21 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115010 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Object-Relational Mapping (ORM) Leak<br /></span>
      <h3>Description</h3>
      <span>An Object-Relational Mapping (ORM) Leak vulnerability occurs when an application does not properly control how user-provided data is passed to the ORM. An attacker can exploit this by manipulating input parameters to query fields that are not intended to be exposed. This can lead to the disclosure of sensitive information from the database, such as user credentials, personal information, or other confidential data. In some cases, it could also allow an attacker to perform unauthorized data modification operations.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that user-controllable input is never directly used to construct ORM queries. Implement a strict whitelist of allowed fields and operators for filtering and searching. Validate and sanitize all input to prevent malicious query modifications.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115010">https://www.tenable.com/plugins/was/115010</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Discourse < 3.3.3 Backup Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/115009</link>
            <guid>https://www.tenable.com/plugins/was/115009</guid>
            <pubDate>Tue, 21 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115009 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Discourse < 3.3.3 Backup Disclosure<br /></span>
      <h3>Description</h3>
      <span>Discourse versions prior to 3.3.3 are vulnerable to a backup disclosure vulnerability due to improper handling of file downloads in the `rails send_file` method. An attacker could exploit this vulnerability to download backup files containing sensitive information, potentially leading to data exposure.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Discourse 3.3.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115009">https://www.tenable.com/plugins/was/115009</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Jenkins Sidepanel Unauthorized Agent/Queue Exposure]]></title>
            <link>https://www.tenable.com/plugins/was/115008</link>
            <guid>https://www.tenable.com/plugins/was/115008</guid>
            <pubDate>Tue, 21 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115008 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Jenkins Sidepanel Unauthorized Agent/Queue Exposure<br /></span>
      <h3>Description</h3>
      <span>Jenkins versions prior to 2.582 and prior to LTS 2.516.3 are affected by a lack of permission check for the authenticated user profile dropdown menu. A remote and unauthenticated attacker can obtain limited information about the Jenkins configuration agent and builds.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Jenkins 2.528, LTS 2.156.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115008">https://www.tenable.com/plugins/was/115008</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Node.js Express DevMode Enabled]]></title>
            <link>https://www.tenable.com/plugins/was/115007</link>
            <guid>https://www.tenable.com/plugins/was/115007</guid>
            <pubDate>Tue, 21 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115007 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Node.js Express DevMode Enabled<br /></span>
      <h3>Description</h3>
      <span>Node.js Express installed on the remote host is configured to operate in development mode (devMode). While this environment can help speed up development of web applications, it can leak information about the underlying web applications as well as the installation of Express, Node.js.<br /></span>
      <h3>Solution</h3>
      <span>Disable Node.js Express development mode.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115007">https://www.tenable.com/plugins/was/115007</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Custom HTTP Header Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115006</link>
            <guid>https://www.tenable.com/plugins/was/115006</guid>
            <pubDate>Tue, 21 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115006 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Custom HTTP Header Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational notice that the scanner was able to detect custom HTTP headers in the target application's responses.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115006">https://www.tenable.com/plugins/was/115006</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Zimbra Collaboration 10.0.x < 10.0.13 Stored Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/115005</link>
            <guid>https://www.tenable.com/plugins/was/115005</guid>
            <pubDate>Tue, 21 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115005 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Zimbra Collaboration 10.0.x < 10.0.13 Stored Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of Zimbra Collaboration running on the remote host is 10.0.x prior to 10.0.13 or 10.1.x prior to 10.1.5. It is, therefore, affected by a Stored Cross-Site Scripting (XSS) vulnerability due to insufficient sanitization of HTML content in ICS files.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Zimbra Collaboration version 10.0.13, 10.1.5 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115005">https://www.tenable.com/plugins/was/115005</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Zimbra Collaboration 10.1.x < 10.1.5 Stored Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/115004</link>
            <guid>https://www.tenable.com/plugins/was/115004</guid>
            <pubDate>Tue, 21 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115004 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Zimbra Collaboration 10.1.x < 10.1.5 Stored Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of Zimbra Collaboration running on the remote host is 10.0.x prior to 10.0.13 or 10.1.x prior to 10.1.5. It is, therefore, affected by a Stored Cross-Site Scripting (XSS) vulnerability due to insufficient sanitization of HTML content in ICS files.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Zimbra Collaboration version 10.0.13, 10.1.5 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115004">https://www.tenable.com/plugins/was/115004</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fortra GoAnywhere MFT License Servlet Deserialization Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/was/115003</link>
            <guid>https://www.tenable.com/plugins/was/115003</guid>
            <pubDate>Tue, 21 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115003 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Fortra GoAnywhere MFT License Servlet Deserialization Vulnerability<br /></span>
      <h3>Description</h3>
      <span>Fortra GoAnywhere MFT is a Managed File Transfer (MFT) solution helping organizations build both internal and external data transfer exchanges. GoAnyWhere MFT versions before 7.8.4 and before 7.6.3 suffer from a deserialization vulnerabilty. By crafting a specific payload, a remote and unauthenticated attacker can achieve remote code execution on the target vulnerable instance.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to version 7.6.3 (sustain release), 7.8.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115003">https://www.tenable.com/plugins/was/115003</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Intercom Chatbot Misconfiguration]]></title>
            <link>https://www.tenable.com/plugins/was/115001</link>
            <guid>https://www.tenable.com/plugins/was/115001</guid>
            <pubDate>Tue, 07 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115001 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Intercom Chatbot Misconfiguration<br /></span>
      <h3>Description</h3>
      <span>Intercom is a solution to build & deploy AI customer experiences. If the identity verification is not enabled, an attacker can impersonate an other user and access to the previous conversations and data. This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span>Enable identity verification in Intercom settings.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115001">https://www.tenable.com/plugins/was/115001</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Dell UnityVSA < 5.5.1.0 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/115000</link>
            <guid>https://www.tenable.com/plugins/was/115000</guid>
            <pubDate>Tue, 07 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115000 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Dell UnityVSA < 5.5.1.0 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>Dell UnityVSA versions prior to 5.5.10 is vulnerable to a Remote Code Execution vulnerability due to an improper input validation. An unauthenticated attacker could exploit this vulnerability by sending a specially crafted request.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Dell UnityVSA version 5.5.1.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115000">https://www.tenable.com/plugins/was/115000</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 8.0.x < 8.0.7 / 8.1.x < 8.1.8 / 8.2.x < 8.2.7 / 8.3.x < 8.3.1 Path Traversal]]></title>
            <link>https://www.tenable.com/plugins/was/114999</link>
            <guid>https://www.tenable.com/plugins/was/114999</guid>
            <pubDate>Tue, 07 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114999 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 8.0.x < 8.0.7 / 8.1.x < 8.1.8 / 8.2.x < 8.2.7 / 8.3.x < 8.3.1 Path Traversal<br /></span>
      <h3>Description</h3>
      <span>Grafana version 8.0.x prior to 8.0.7, 8.1.x prior to 8.1.8, 8.2.x prior to 8.2.7, and 8.3.x prior to 8.3.1 are vulnerable to a path traversal issue that could allow an attacker to read arbitrary files on the host system that Grafana has access to.<br /></span><span><br /></span><span>A remote attacker could exploit this vulnerability by sending a specially crafted request to the affected application.<br /></span><span><br /></span><span>Successful exploitation could allow the attacker to read sensitive files on the host system.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Grafana version 8.0.7 or 8.1.8 or 8.2.7 or 8.3.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114999">https://www.tenable.com/plugins/was/114999</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.5.x < 11.5.3 Improper Authorization]]></title>
            <link>https://www.tenable.com/plugins/was/114998</link>
            <guid>https://www.tenable.com/plugins/was/114998</guid>
            <pubDate>Tue, 07 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114998 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.5.x < 11.5.3 Improper Authorization<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is prior to 10.4.17, or 11.2.x prior to 11.2.8, or 11.3.x prior to 11.3.5, or 11.4.x prior to 11.4.3, or 11.5.x prior to 11.5.3. It is, therefore, affected by an improper authorization.<br /></span><span><br /></span><span>- Grafana's datasource proxy API allows authorization checks to be bypassed by adding an extra slash character in the URL path.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.5.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114998">https://www.tenable.com/plugins/was/114998</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.4.x < 11.4.3 Improper Authorization]]></title>
            <link>https://www.tenable.com/plugins/was/114997</link>
            <guid>https://www.tenable.com/plugins/was/114997</guid>
            <pubDate>Tue, 07 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114997 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.4.x < 11.4.3 Improper Authorization<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is prior to 10.4.17, or 11.2.x prior to 11.2.8, or 11.3.x prior to 11.3.5, or 11.4.x prior to 11.4.3, or 11.5.x prior to 11.5.3. It is, therefore, affected by an improper authorization.<br /></span><span><br /></span><span>- Grafana's datasource proxy API allows authorization checks to be bypassed by adding an extra slash character in the URL path.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.4.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114997">https://www.tenable.com/plugins/was/114997</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.3.x < 11.3.5 Improper Authorization]]></title>
            <link>https://www.tenable.com/plugins/was/114996</link>
            <guid>https://www.tenable.com/plugins/was/114996</guid>
            <pubDate>Tue, 07 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114996 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.3.x < 11.3.5 Improper Authorization<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is prior to 10.4.17, or 11.2.x prior to 11.2.8, or 11.3.x prior to 11.3.5, or 11.4.x prior to 11.4.3, or 11.5.x prior to 11.5.3. It is, therefore, affected by an improper authorization.<br /></span><span><br /></span><span>- Grafana's datasource proxy API allows authorization checks to be bypassed by adding an extra slash character in the URL path.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.3.5 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114996">https://www.tenable.com/plugins/was/114996</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.2.x < 11.2.8 Improper Authorization]]></title>
            <link>https://www.tenable.com/plugins/was/114995</link>
            <guid>https://www.tenable.com/plugins/was/114995</guid>
            <pubDate>Tue, 07 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114995 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.2.x < 11.2.8 Improper Authorization<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is prior to 10.4.17, or 11.2.x prior to 11.2.8, or 11.3.x prior to 11.3.5, or 11.4.x prior to 11.4.3, or 11.5.x prior to 11.5.3. It is, therefore, affected by an improper authorization.<br /></span><span><br /></span><span>- Grafana's datasource proxy API allows authorization checks to be bypassed by adding an extra slash character in the URL path.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.2.8 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114995">https://www.tenable.com/plugins/was/114995</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana < 10.4.17 Improper Authorization]]></title>
            <link>https://www.tenable.com/plugins/was/114994</link>
            <guid>https://www.tenable.com/plugins/was/114994</guid>
            <pubDate>Tue, 07 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114994 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana < 10.4.17 Improper Authorization<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is prior to 10.4.17, or 11.2.x prior to 11.2.8, or 11.3.x prior to 11.3.5, or 11.4.x prior to 11.4.3, or 11.5.x prior to 11.5.3. It is, therefore, affected by an improper authorization.<br /></span><span><br /></span><span>- Grafana's datasource proxy API allows authorization checks to be bypassed by adding an extra slash character in the URL path.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 10.4.17 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114994">https://www.tenable.com/plugins/was/114994</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana < 11.6.2 Improper Input Validation]]></title>
            <link>https://www.tenable.com/plugins/was/114993</link>
            <guid>https://www.tenable.com/plugins/was/114993</guid>
            <pubDate>Tue, 07 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114993 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana < 11.6.2 Improper Input Validation<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is prior to 11.6.2. It is, therefore, affected by an improper input validation.<br /></span><span><br /></span><span>- An excessively long dashboard title or panel name will cause Chromium browsers to become unresponsive due to Improper Input Validation vulnerability in Grafana.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.6.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114993">https://www.tenable.com/plugins/was/114993</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 12.1.x < 12.1.2 Multiples Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114992</link>
            <guid>https://www.tenable.com/plugins/was/114992</guid>
            <pubDate>Tue, 07 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114992 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 12.1.x < 12.1.2 Multiples Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is prior to 11.3.8, or 11.4.x prior to 11.4.6, or 11.5.x prior to 11.5.6, or 11.6.x prior to 11.6.3, or 12.0.x prior to 12.0.2, or 12.1.x prior to 12.1.2. It is, therefore, affected by multiples vulnerabilities.<br /></span><span><br /></span><span>- An Open Redirect vulnerability in Grafana organization switching functionality.<br /></span><span><br /></span><span>- An Open Redirect can be chained with Path Traversal vulnerabilities to achieve XSS via scripted dashboards.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 12.1.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114992">https://www.tenable.com/plugins/was/114992</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 12.0.x < 12.0.2 Multiples Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114991</link>
            <guid>https://www.tenable.com/plugins/was/114991</guid>
            <pubDate>Tue, 07 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114991 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 12.0.x < 12.0.2 Multiples Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is prior to 11.3.8, or 11.4.x prior to 11.4.6, or 11.5.x prior to 11.5.6, or 11.6.x prior to 11.6.3, or 12.0.x prior to 12.0.2, or 12.1.x prior to 12.1.2. It is, therefore, affected by multiples vulnerabilities.<br /></span><span><br /></span><span>- An Open Redirect vulnerability in Grafana organization switching functionality.<br /></span><span><br /></span><span>- An Open Redirect can be chained with Path Traversal vulnerabilities to achieve XSS via scripted dashboards.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 12.0.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114991">https://www.tenable.com/plugins/was/114991</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.6.x < 11.6.3 Multiples Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114990</link>
            <guid>https://www.tenable.com/plugins/was/114990</guid>
            <pubDate>Tue, 07 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114990 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.6.x < 11.6.3 Multiples Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is prior to 11.3.8, or 11.4.x prior to 11.4.6, or 11.5.x prior to 11.5.6, or 11.6.x prior to 11.6.3, or 12.0.x prior to 12.0.2, or 12.1.x prior to 12.1.2. It is, therefore, affected by multiples vulnerabilities.<br /></span><span><br /></span><span>- An Open Redirect vulnerability in Grafana organization switching functionality.<br /></span><span><br /></span><span>- An Open Redirect can be chained with Path Traversal vulnerabilities to achieve XSS via scripted dashboards.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.6.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114990">https://www.tenable.com/plugins/was/114990</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.5.x < 11.5.6 Multiples Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114989</link>
            <guid>https://www.tenable.com/plugins/was/114989</guid>
            <pubDate>Tue, 07 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114989 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.5.x < 11.5.6 Multiples Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is prior to 11.3.8, or 11.4.x prior to 11.4.6, or 11.5.x prior to 11.5.6, or 11.6.x prior to 11.6.3, or 12.0.x prior to 12.0.2, or 12.1.x prior to 12.1.2. It is, therefore, affected by multiples vulnerabilities.<br /></span><span><br /></span><span>- An Open Redirect vulnerability in Grafana organization switching functionality.<br /></span><span><br /></span><span>- An Open Redirect can be chained with Path Traversal vulnerabilities to achieve XSS via scripted dashboards.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.5.6 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114989">https://www.tenable.com/plugins/was/114989</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.4.x < 11.4.6 Multiples Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114988</link>
            <guid>https://www.tenable.com/plugins/was/114988</guid>
            <pubDate>Tue, 07 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114988 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.4.x < 11.4.6 Multiples Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is prior to 11.3.8, or 11.4.x prior to 11.4.6, or 11.5.x prior to 11.5.6, or 11.6.x prior to 11.6.3, or 12.0.x prior to 12.0.2, or 12.1.x prior to 12.1.2. It is, therefore, affected by multiples vulnerabilities.<br /></span><span><br /></span><span>- An Open Redirect vulnerability in Grafana organization switching functionality.<br /></span><span><br /></span><span>- An Open Redirect can be chained with Path Traversal vulnerabilities to achieve XSS via scripted dashboards.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.4.6 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114988">https://www.tenable.com/plugins/was/114988</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana < 11.3.8 Multiples Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114987</link>
            <guid>https://www.tenable.com/plugins/was/114987</guid>
            <pubDate>Tue, 07 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114987 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana < 11.3.8 Multiples Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is prior to 11.3.8, or 11.4.x prior to 11.4.6, or 11.5.x prior to 11.5.6, or 11.6.x prior to 11.6.3, or 12.0.x prior to 12.0.2, or 12.1.x prior to 12.1.2. It is, therefore, affected by multiples vulnerabilities.<br /></span><span><br /></span><span>- An Open Redirect vulnerability in Grafana organization switching functionality.<br /></span><span><br /></span><span>- An Open Redirect can be chained with Path Traversal vulnerabilities to achieve XSS via scripted dashboards.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.3.8 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114987">https://www.tenable.com/plugins/was/114987</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Netdisco Unauthenticated Access]]></title>
            <link>https://www.tenable.com/plugins/was/115002</link>
            <guid>https://www.tenable.com/plugins/was/115002</guid>
            <pubDate>Mon, 06 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115002 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Netdisco Unauthenticated Access<br /></span>
      <h3>Description</h3>
      <span>Netdisco is a web-based network management tool. When accessible without authentication, an attacker can gain unauthorized access to the Netdisco interface, potentially leading to information disclosure or further exploitation of the system.<br /></span>
      <h3>Solution</h3>
      <span>Authentication should be enforced to prevent unauthorized access to the Netdisco interface.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115002">https://www.tenable.com/plugins/was/115002</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Airflow Unauthenticated Access]]></title>
            <link>https://www.tenable.com/plugins/was/114986</link>
            <guid>https://www.tenable.com/plugins/was/114986</guid>
            <pubDate>Fri, 03 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114986 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Airflow Unauthenticated Access<br /></span>
      <h3>Description</h3>
      <span>Apache Airflow is a platform to programmatically author, schedule and monitor workflows. When authentication is not enabled, an attacker can access the Airflow web interface without any credentials. This may allow an attacker to view and modify workflows, access sensitive information, and potentially execute arbitrary code on the server hosting Airflow.<br /></span>
      <h3>Solution</h3>
      <span>Authentication should be enforced to prevent unauthorized access to the Apache Airflow interface.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114986">https://www.tenable.com/plugins/was/114986</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Hitachi Pentaho Business Analytics Server 8.3.x < 9.3.0.2 / 9.4.x < 9.4.0.1 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114985</link>
            <guid>https://www.tenable.com/plugins/was/114985</guid>
            <pubDate>Fri, 03 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114985 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Hitachi Pentaho Business Analytics Server 8.3.x < 9.3.0.2 / 9.4.x < 9.4.0.1 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>Hitachi Pentaho Business Analytics Server versions 8.3.x prior to 9.3.0.2 or 9.4.x prior to 9.4.0.1 suffer from a remote code execution vulnerability. An attacker can exploit this issue by sending a specially crafted HTTP request to the affected application. A successful exploit could allow the attacker to execute arbitrary code on the target system.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Hitachi Pentaho Business Analytics Server version 9.3.0.2 or 9.4.0.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114985">https://www.tenable.com/plugins/was/114985</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Kylin 2.3.x < 3.1.0 Command Injection]]></title>
            <link>https://www.tenable.com/plugins/was/114984</link>
            <guid>https://www.tenable.com/plugins/was/114984</guid>
            <pubDate>Fri, 03 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114984 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Kylin 2.3.x < 3.1.0 Command Injection<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of Apache Kylin running on the remote host is 2.3.x < 3.1.0. It is, therefore, affected by a Command Injection vulnerability through the REST API.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Apache Kylin version 3.1.0 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114984">https://www.tenable.com/plugins/was/114984</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Zyxel < 5.38 Directory Traversal]]></title>
            <link>https://www.tenable.com/plugins/was/114983</link>
            <guid>https://www.tenable.com/plugins/was/114983</guid>
            <pubDate>Fri, 03 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114983 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Zyxel < 5.38 Directory Traversal<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of Zyxel running on the remote host is < 5.38. It is, therefore, affected by a Directory Traversal that could allow an attacker to download or upload files via a crafted URL.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Zyxel version 5.38 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114983">https://www.tenable.com/plugins/was/114983</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Joomla! 4.x < 4.4.14 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114982</link>
            <guid>https://www.tenable.com/plugins/was/114982</guid>
            <pubDate>Fri, 03 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114982 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Joomla! 4.x < 4.4.14 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the instance of Joomla! running on the remote web server is 4.x prior to 4.4.14 or 5.x prior to 5.3.4. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span> - Inadequate content filtering within the checkAttribute methods leads to XSS vulnerabilities in various components. (CVE-2025-54476)<br /></span><span><br /></span><span> - Improper handling of authentication requests lead to a user enumeration vector in the passkey authentication method. (CVE-2025-54477)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Joomla! version 4.4.14 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114982">https://www.tenable.com/plugins/was/114982</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Joomla! 5.x < 5.3.4 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114981</link>
            <guid>https://www.tenable.com/plugins/was/114981</guid>
            <pubDate>Fri, 03 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114981 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Joomla! 5.x < 5.3.4 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the instance of Joomla! running on the remote web server is 4.x prior to 4.4.14 or 5.x prior to 5.3.4. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span> - Inadequate content filtering within the checkAttribute methods leads to XSS vulnerabilities in various components. (CVE-2025-54476)<br /></span><span><br /></span><span> - Improper handling of authentication requests lead to a user enumeration vector in the passkey authentication method. (CVE-2025-54477)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Joomla! version 5.3.4 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114981">https://www.tenable.com/plugins/was/114981</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[TRUFusion Entreprise Sensitive Data Exposure]]></title>
            <link>https://www.tenable.com/plugins/was/114980</link>
            <guid>https://www.tenable.com/plugins/was/114980</guid>
            <pubDate>Fri, 03 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114980 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>TRUFusion Entreprise Sensitive Data Exposure<br /></span>
      <h3>Description</h3>
      <span>TRUFusion Entreprise is a solution to easily and securely manage the exchange of CAD files and related product design data from within your PLM system. Due to a lack of control, it is possible for an unauthenticated attacker to access an endpoint that returns all partners who have access to the instance.<br /></span>
      <h3>Solution</h3>
      <span>Refer to the TRUFusion Entreprise advisory for mitigation options.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114980">https://www.tenable.com/plugins/was/114980</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[pyLoad Default Credentials]]></title>
            <link>https://www.tenable.com/plugins/was/114979</link>
            <guid>https://www.tenable.com/plugins/was/114979</guid>
            <pubDate>Fri, 03 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114979 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>pyLoad Default Credentials<br /></span>
      <h3>Description</h3>
      <span>pyLoad is an open-source download manager written in Python. By default, pyLoad is configured with a default username and password allowing any attacker to log in to the application and have full access to its functionality. An attacker can leverage this vulnerability to perform further attacks against the application.<br /></span>
      <h3>Solution</h3>
      <span>The application should not be configured with accounts using default or predictable credentials. A complex password policy should be defined and enforced on every account available in the application to prevent attackers from guessing it and have unauthorized access to the application.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114979">https://www.tenable.com/plugins/was/114979</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[pyLoad < 0.5.0b3.dev76 Improper Access Control]]></title>
            <link>https://www.tenable.com/plugins/was/114978</link>
            <guid>https://www.tenable.com/plugins/was/114978</guid>
            <pubDate>Fri, 03 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114978 with High Severity</p>
      <h3>Synopsis</h3>
      <span>pyLoad < 0.5.0b3.dev76 Improper Access Control<br /></span>
      <h3>Description</h3>
      <span>pyLoad version prior to 0.5.0b3.dev76 is affected by an Improper Access Control vulnerability. Any unauthenticated user can browse to a specific URL to expose the Flask config, including the `SECRET_KEY` variable. An attacker can leverage this vulnerability to perform further attacks against the application.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to pyLoad version 0.5.0b3.dev76 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114978">https://www.tenable.com/plugins/was/114978</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[ProjectSend < r1720 Improper Authorization]]></title>
            <link>https://www.tenable.com/plugins/was/114977</link>
            <guid>https://www.tenable.com/plugins/was/114977</guid>
            <pubDate>Fri, 03 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114977 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>ProjectSend < r1720 Improper Authorization<br /></span>
      <h3>Description</h3>
      <span>ProjectSend version prior to r1720 is affected by an Improper Authorization vulnerability. An unauthenticated attacker can exploit this issue to access sensitive information and perform unauthorized actions within the application.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to ProjectSend version r1720 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114977">https://www.tenable.com/plugins/was/114977</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[GoCD Unauthenticated Access]]></title>
            <link>https://www.tenable.com/plugins/was/114976</link>
            <guid>https://www.tenable.com/plugins/was/114976</guid>
            <pubDate>Fri, 26 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114976 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>GoCD Unauthenticated Access<br /></span>
      <h3>Description</h3>
      <span>GoCD is an open-source continuous delivery server. When accessible without authentication, an attacker can gain unauthorized access to the GoCD interface, potentially leading to information disclosure or further exploitation of the system.<br /></span>
      <h3>Solution</h3>
      <span>Authentication should be enforced to prevent unauthorized access to the GoCD interface.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114976">https://www.tenable.com/plugins/was/114976</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Anteon Unauthenticated Access]]></title>
            <link>https://www.tenable.com/plugins/was/114975</link>
            <guid>https://www.tenable.com/plugins/was/114975</guid>
            <pubDate>Fri, 26 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114975 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Anteon Unauthenticated Access<br /></span>
      <h3>Description</h3>
      <span>Anteon is an eBPF-based Kubernetes Monitoring and Performance Testing Platform. When accessible without authentication, an attacker can gain unauthorized access to the Anteon interface, potentially leading to information disclosure or further exploitation of the system.<br /></span>
      <h3>Solution</h3>
      <span>Authentication should be enforced to prevent unauthorized access to the Anteon interface.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114975">https://www.tenable.com/plugins/was/114975</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Clickhouse API Unauthenticated Access]]></title>
            <link>https://www.tenable.com/plugins/was/114974</link>
            <guid>https://www.tenable.com/plugins/was/114974</guid>
            <pubDate>Fri, 26 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114974 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Clickhouse API Unauthenticated Access<br /></span>
      <h3>Description</h3>
      <span>Clickhouse is an open-source columnar database management system for online analytical processing. The Clickhouse HTTP interface allows users to interact with the database using HTTP requests.<br /></span><span><br /></span><span>When no authentication is configured, the Clickhouse API can be accessed without any credentials. This can lead to unauthorized access to sensitive data and potential data breaches.<br /></span>
      <h3>Solution</h3>
      <span>Authentication should be enforced to prevent unauthorized access to the Clickhouse API.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114974">https://www.tenable.com/plugins/was/114974</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Tiny File Manager Default Credentials]]></title>
            <link>https://www.tenable.com/plugins/was/114973</link>
            <guid>https://www.tenable.com/plugins/was/114973</guid>
            <pubDate>Fri, 26 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114973 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Tiny File Manager Default Credentials<br /></span>
      <h3>Description</h3>
      <span>Tiny File Manager is a web-based file manager that allows users to manage files on a server through a web interface. By default, Tiny File Manager comes with a default username and password combination. If these default credentials are not changed, a remote and unauthenticated attacker could gain unauthorized access to the application and perform arbitrary actions on it.<br /></span>
      <h3>Solution</h3>
      <span>The application should not be configured with accounts using default or predictable credentials. A complex password policy should be defined and enforced on every account available in the application to prevent attackers from guessing it and have unauthorized access to the application.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114973">https://www.tenable.com/plugins/was/114973</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Tiny File Manager Unauthenticated Access]]></title>
            <link>https://www.tenable.com/plugins/was/114972</link>
            <guid>https://www.tenable.com/plugins/was/114972</guid>
            <pubDate>Fri, 26 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114972 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Tiny File Manager Unauthenticated Access<br /></span>
      <h3>Description</h3>
      <span>Tiny File Manager is a web-based file manager written in PHP. It allows users to manage files on a web server through a simple and user-friendly interface. When authentication is not enforced, an attacker can access the File Browser interface without any credentials. This can lead to unauthorized access to files and directories on the server, potentially exposing sensitive information or allowing for further exploitation of the system.<br /></span>
      <h3>Solution</h3>
      <span>Authentication should be enforced to prevent unauthorized access to the Tiny File Manager interface.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114972">https://www.tenable.com/plugins/was/114972</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[File Browser Unauthenticated Access]]></title>
            <link>https://www.tenable.com/plugins/was/114971</link>
            <guid>https://www.tenable.com/plugins/was/114971</guid>
            <pubDate>Fri, 26 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114971 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>File Browser Unauthenticated Access<br /></span>
      <h3>Description</h3>
      <span>File Browser is an open-source web-based file manager that allows users to manage files on a server through a web interface. If the File Browser instance is accessible without authentication, it can lead to unauthorized access to sensitive files and directories on the server.<br /></span>
      <h3>Solution</h3>
      <span>Authentication should be enforced to prevent unauthorized access to the File Browser interface.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114971">https://www.tenable.com/plugins/was/114971</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[cAdvisor Unauthenticated Access]]></title>
            <link>https://www.tenable.com/plugins/was/114970</link>
            <guid>https://www.tenable.com/plugins/was/114970</guid>
            <pubDate>Fri, 26 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114970 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>cAdvisor Unauthenticated Access<br /></span>
      <h3>Description</h3>
      <span>cAdvisor (short for container Advisor) is an open-source tool developed by Google that provides real-time monitoring and performance analysis of running containers. By default, cAdvisor does not require authentication to access the application. This allows an attacker to access sensitive data.<br /></span>
      <h3>Solution</h3>
      <span>Authentication should be enforced to prevent unauthorized access to the cAdvisor interface.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114970">https://www.tenable.com/plugins/was/114970</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[H2O Flow Unauthenticated Access]]></title>
            <link>https://www.tenable.com/plugins/was/114969</link>
            <guid>https://www.tenable.com/plugins/was/114969</guid>
            <pubDate>Fri, 26 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114969 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>H2O Flow Unauthenticated Access<br /></span>
      <h3>Description</h3>
      <span>H2O Flow is an open-source user interface for H2O, an open-source, distributed and scalable machine learning and predictive analytics platform. By default, H2O Flow does not require authentication to access the application. This allows an attacker to access sensitive data. This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span>Authentication should be enforced to prevent unauthorized access to the H2O Flow interface.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114969">https://www.tenable.com/plugins/was/114969</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Jenkins Unauthenticated Access]]></title>
            <link>https://www.tenable.com/plugins/was/114968</link>
            <guid>https://www.tenable.com/plugins/was/114968</guid>
            <pubDate>Fri, 26 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114968 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Jenkins Unauthenticated Access<br /></span>
      <h3>Description</h3>
      <span>Jenkins is an open-source automation server used to automate various aspects of software development, including building, testing, and deploying application. If authentication is not enforced, an attacker can gain administrative access to Jenkins, potentially allowing for the execution of arbitrary code, theft of sensitive information, and full control over the CI/CD pipeline.<br /></span>
      <h3>Solution</h3>
      <span>Authentication should be enforced to prevent unauthorized access to the Jenkins instance.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114968">https://www.tenable.com/plugins/was/114968</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Personal Identifying Information (PII) Fields Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114966</link>
            <guid>https://www.tenable.com/plugins/was/114966</guid>
            <pubDate>Fri, 26 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114966 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Personal Identifying Information (PII) Fields Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational notice that the scanner was able to detect forms with fields collecting Personal Identifying Information (PII) data. Examples of PII data include, but are not limited to, names, email addresses, phone numbers, social security numbers, and financial information.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114966">https://www.tenable.com/plugins/was/114966</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Jenkins User Registration Form Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114967</link>
            <guid>https://www.tenable.com/plugins/was/114967</guid>
            <pubDate>Tue, 23 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114967 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Jenkins User Registration Form Detected<br /></span>
      <h3>Description</h3>
      <span>Jenkins is an open-source automation server used to automate various aspects of software development, including building, testing, and deploying applications. An internal only Jenkins instance may be misconfigured to allow user registration, potentially leading to attackers creating accounts and gaining unauthorized access to the Jenkins instance and its resources.<br /></span>
      <h3>Solution</h3>
      <span>Review the scope of the Jenkins instance. If the detected instance is intended for internal users only, disable the user registration feature.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114967">https://www.tenable.com/plugins/was/114967</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MCP Server Tools Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114965</link>
            <guid>https://www.tenable.com/plugins/was/114965</guid>
            <pubDate>Fri, 19 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114965 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>MCP Server Tools Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational notice that the scanner was able to detect the exposition of tools on the target Model Context Protocol (MCP) server.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114965">https://www.tenable.com/plugins/was/114965</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Jenkins Cross-Site WebSocket Hijacking]]></title>
            <link>https://www.tenable.com/plugins/was/114964</link>
            <guid>https://www.tenable.com/plugins/was/114964</guid>
            <pubDate>Fri, 19 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114964 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Jenkins Cross-Site WebSocket Hijacking<br /></span>
      <h3>Description</h3>
      <span>A vulnerability exists in Jenkins versions from 2.217 before 2.442 and from LTS 2.222.1 before LTS 2.426.3 allowing an unauthenticated and remote attacker to trick a user authenticated on the target Jenkins instance and perform Jenkins CLI cross-site arbitrary commands through websockets.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Jenkins version 2.442, LTS 2.426.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114964">https://www.tenable.com/plugins/was/114964</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Flowise < 3.0.6 Multiples Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114963</link>
            <guid>https://www.tenable.com/plugins/was/114963</guid>
            <pubDate>Fri, 19 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114963 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Flowise < 3.0.6 Multiples Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of Flowise running on the remote host is < 3.0.6. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span>- An Unauthenticated Password Reset Token Disclosure<br /></span><span><br /></span><span>- A Server-Side Request Forgery vulnerability in the /api/v1/fetch-links endpoint<br /></span><span><br /></span><span>- A Remote Code Execution through CustomMCP node<br /></span><span><br /></span><span>- An unauthenticated Arbitrary File Read vulnerability through the chatId parameter supplied to both the /api/v1/get-upload-file and /api/v1/openai-assistants-file/download endpoints<br /></span><span><br /></span><span>- A Remote Code Execution through the Supabase RPC Filter component<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Flowise version 3.0.6 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114963">https://www.tenable.com/plugins/was/114963</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Lunary Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114962</link>
            <guid>https://www.tenable.com/plugins/was/114962</guid>
            <pubDate>Fri, 19 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114962 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Lunary Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected a publicly accessible Lunary instance on the target application. Lunary is an observability, prompt management and evaluations platform. This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span>If the application is not expected to be public, restrict access using a .htaccess file, limiting access to known IP Addresses.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114962">https://www.tenable.com/plugins/was/114962</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AIOHTTP < 3.9.2 Directory Traversal]]></title>
            <link>https://www.tenable.com/plugins/was/114961</link>
            <guid>https://www.tenable.com/plugins/was/114961</guid>
            <pubDate>Fri, 12 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114961 with High Severity</p>
      <h3>Synopsis</h3>
      <span>AIOHTTP < 3.9.2 Directory Traversal<br /></span>
      <h3>Description</h3>
      <span>AIOHTTP versions prior to 3.9.2 are vulnerable to a directory traversal allowing an unauthenticated attacker to access sensitive files via a specially crafted request.<br /></span>
      <h3>Solution</h3>
      <span>Update to AIOHTTP version 3.9.2 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114961">https://www.tenable.com/plugins/was/114961</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cacti 1.3.x-DEV Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114960</link>
            <guid>https://www.tenable.com/plugins/was/114960</guid>
            <pubDate>Tue, 09 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114960 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Cacti 1.3.x-DEV Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>Cacti version 1.3.x-DEV suffer from an unauthenticated remote code execution vulnerability. An attacker can exploit this issue by sending a specially crafted HTTP request to the affected application. A successful exploit could allow the attacker to execute arbitrary code on the target system.<br /></span>
      <h3>Solution</h3>
      <span>If you use the develop branch ensure to use a version after commit a56b28e34450921dc8299b0521b59a9c2da1732c<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114960">https://www.tenable.com/plugins/was/114960</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[LLM Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114959</link>
            <guid>https://www.tenable.com/plugins/was/114959</guid>
            <pubDate>Tue, 09 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114959 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>LLM Detected<br /></span>
      <h3>Description</h3>
      <span>The scanner detected the presence of a Large Language Model (LLM) on the target application. LLMs are advanced AI models capable of understanding and generating human-like text based on the input they receive. They are commonly used in various applications, including chatbots, virtual assistants, content generation, and more.<br /></span><span><br /></span><span>The presence of an LLM can introduce unique security considerations, such as data privacy concerns, potential for generating misleading or harmful content, and vulnerabilities specific to AI models.<br /></span><span><br /></span><span>This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114959">https://www.tenable.com/plugins/was/114959</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Nuxt Icon < 1.4.5 Server-Side Request Forgery]]></title>
            <link>https://www.tenable.com/plugins/was/114958</link>
            <guid>https://www.tenable.com/plugins/was/114958</guid>
            <pubDate>Tue, 09 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114958 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Nuxt Icon < 1.4.5 Server-Side Request Forgery<br /></span>
      <h3>Description</h3>
      <span>Nuxt Icon versions prior to 1.4.5 are vulnerable to Server-Side Request Forgery (SSRF) due to insufficient validation of user-supplied URLs in the icon fetching functionality. An attacker can exploit this vulnerability by providing a malicious URL that points to an internal or restricted resource, potentially leading to unauthorized access or data exfiltration.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Next.js version 9.5.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114958">https://www.tenable.com/plugins/was/114958</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FreeBPX < 17.0.3 Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114957</link>
            <guid>https://www.tenable.com/plugins/was/114957</guid>
            <pubDate>Wed, 03 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114957 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>FreeBPX < 17.0.3 Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the FreePBOX application running on the remote host is prior to 15.0.66 or 16.x prior to 16.0.89 or 17.x prior to 17.0.3. It is, therefore, affected by an insufficiently sanitized user-supplied data allowing unauthenticated access to FreePBX Administrator leading to arbitrary database manipulation and remote code execution.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to FreeBPX version 17.0.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114957">https://www.tenable.com/plugins/was/114957</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FreeBPX < 16.0.89 Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114956</link>
            <guid>https://www.tenable.com/plugins/was/114956</guid>
            <pubDate>Wed, 03 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114956 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>FreeBPX < 16.0.89 Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the FreePBOX application running on the remote host is prior to 15.0.66 or 16.x prior to 16.0.89 or 17.x prior to 17.0.3. It is, therefore, affected by an insufficiently sanitized user-supplied data allowing unauthenticated access to FreePBX Administrator leading to arbitrary database manipulation and remote code execution.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to FreeBPX version 16.0.89 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114956">https://www.tenable.com/plugins/was/114956</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FreeBPX < 15.0.66 Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114955</link>
            <guid>https://www.tenable.com/plugins/was/114955</guid>
            <pubDate>Wed, 03 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114955 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>FreeBPX < 15.0.66 Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the FreePBOX application running on the remote host is prior to 15.0.66 or 16.x prior to 16.0.89 or 17.x prior to 17.0.3. It is, therefore, affected by an insufficiently sanitized user-supplied data allowing unauthenticated access to FreePBX Administrator leading to arbitrary database manipulation and remote code execution.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to FreeBPX version 15.0.66 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114955">https://www.tenable.com/plugins/was/114955</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Nginx 0.7.22 < 1.29.1 Buffer Over-read]]></title>
            <link>https://www.tenable.com/plugins/was/114954</link>
            <guid>https://www.tenable.com/plugins/was/114954</guid>
            <pubDate>Wed, 03 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114954 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Nginx 0.7.22 < 1.29.1 Buffer Over-read<br /></span>
      <h3>Description</h3>
      <span>According to its Server response header, the installed version of nginx is from 0.7.22 to 1.29.0. It is, therefore, affected by a buffer over-read vulnerability in the ngx_mail_smtp_module that might allow an unauthenticated attacker to over-read NGINX SMTP authentication process memory; as a result, the server side may leak arbitrary bytes sent in a request to the authentication server.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to nginx version 1.29.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114954">https://www.tenable.com/plugins/was/114954</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 9.0.0-M1 < 9.0.108 Denial of Service]]></title>
            <link>https://www.tenable.com/plugins/was/114953</link>
            <guid>https://www.tenable.com/plugins/was/114953</guid>
            <pubDate>Wed, 03 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114953 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 9.0.0-M1 < 9.0.108 Denial of Service<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.108, 10.1.0-M1 prior to 10.1.44 or 11.0.0-M1 prior to 11.0.10. It is, therefore, affected by a denial of service vulnerability due to Tomcat's HTTP/2 implementation vulnerable to the made you reset attack.<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.108 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114953">https://www.tenable.com/plugins/was/114953</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 10.1.0-M1 < 10.1.44 Denial of Service]]></title>
            <link>https://www.tenable.com/plugins/was/114952</link>
            <guid>https://www.tenable.com/plugins/was/114952</guid>
            <pubDate>Wed, 03 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114952 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 10.1.0-M1 < 10.1.44 Denial of Service<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.108, 10.1.0-M1 prior to 10.1.44 or 11.0.0-M1 prior to 11.0.10. It is, therefore, affected by a denial of service vulnerability due to Tomcat's HTTP/2 implementation vulnerable to the made you reset attack.<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.44 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114952">https://www.tenable.com/plugins/was/114952</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 11.0.0-M1 < 11.0.10 Denial of Service]]></title>
            <link>https://www.tenable.com/plugins/was/114951</link>
            <guid>https://www.tenable.com/plugins/was/114951</guid>
            <pubDate>Wed, 03 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114951 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 11.0.0-M1 < 11.0.10 Denial of Service<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.108, 10.1.0-M1 prior to 10.1.44 or 11.0.0-M1 prior to 11.0.10. It is, therefore, affected by a denial of service vulnerability due to Tomcat's HTTP/2 implementation vulnerable to the made you reset attack.<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 11.0.10 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114951">https://www.tenable.com/plugins/was/114951</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[CrushFTP < 10.8.5 / 11.x < 11.3.4_23 Race Condition]]></title>
            <link>https://www.tenable.com/plugins/was/114950</link>
            <guid>https://www.tenable.com/plugins/was/114950</guid>
            <pubDate>Wed, 03 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114950 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>CrushFTP < 10.8.5 / 11.x < 11.3.4_23 Race Condition<br /></span>
      <h3>Description</h3>
      <span>CrushFTP versions prior to 10.8.5 and 11.x versions prior to 11.3.4_23 are vulnerable to a race condition that could allow an unauthenticated remote attacker to access unauthorized endpoints through a specially crafted request.<br /></span><span><br /></span><span>This issue is due to improper handling of concurrent requests. An attacker could exploit this issue by sending multiple requests in parallel to the affected application.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to CrushFTP 10.8.5 or 11.3.4_23 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114950">https://www.tenable.com/plugins/was/114950</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Langflow < 1.5.1 Privilege Escalation]]></title>
            <link>https://www.tenable.com/plugins/was/114949</link>
            <guid>https://www.tenable.com/plugins/was/114949</guid>
            <pubDate>Wed, 03 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114949 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Langflow < 1.5.1 Privilege Escalation<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of Langflow running on the remote host is prior to 1.5.1. It is, therefore, affected by a Privilege Escalation vulnerability that allows an authenticated user with RCE access to create a new administrative user.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Langflow version 1.5.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114949">https://www.tenable.com/plugins/was/114949</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[UUID/GUID Version 1 Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114948</link>
            <guid>https://www.tenable.com/plugins/was/114948</guid>
            <pubDate>Wed, 03 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114948 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>UUID/GUID Version 1 Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected a UUID/GUID version 1.<br /></span><span><br /></span><span>UUID/GUID version 1 contains the MAC address of the computer that generated it, as well as a timestamp. This means that if an attacker can obtain a UUID/GUID version 1, they can infer host identity and generation time, and-because v1 embeds largely deterministic fields predict other identifiers generated around the same time (e.g., by enumerating timestamps/clock sequence). This enables correlation, enumeration, and token-guessing attacks when v1 is used for security-sensitive values.<br /></span>
      <h3>Solution</h3>
      <span>Do not use UUID/GUID version 1 for secrets or identifiers that gate access. Prefer cryptographically random identifiers such as UUID/GUID version 4 (or version 7 backed by a CSPRNG).<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114948">https://www.tenable.com/plugins/was/114948</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[User Enumeration]]></title>
            <link>https://www.tenable.com/plugins/was/114947</link>
            <guid>https://www.tenable.com/plugins/was/114947</guid>
            <pubDate>Wed, 03 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114947 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>User Enumeration<br /></span>
      <h3>Description</h3>
      <span>The scanner has detected a potential user enumeration vulnerability in the web application. This vulnerability allows an attacker to determine valid usernames by observing the application's responses.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that user enumeration vulnerabilities are mitigated by implementing proper authentication mechanisms and generic error messages, rate limiting, and other techniques to prevent attackers from determining valid usernames.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114947">https://www.tenable.com/plugins/was/114947</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unauthenticated Cache Purge]]></title>
            <link>https://www.tenable.com/plugins/was/114946</link>
            <guid>https://www.tenable.com/plugins/was/114946</guid>
            <pubDate>Wed, 03 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114946 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Unauthenticated Cache Purge<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected an unauthenticated cache purge functionality in the web server. This could potentially allow an attacker to clear the cache without authentication, leading to service disruption or other issues.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the cache purge functionality is secured and not accessible to unauthorized users. Implement proper authentication and authorization mechanisms to restrict access to cache purging operations.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114946">https://www.tenable.com/plugins/was/114946</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WSDL Import Failed]]></title>
            <link>https://www.tenable.com/plugins/was/114930</link>
            <guid>https://www.tenable.com/plugins/was/114930</guid>
            <pubDate>Tue, 19 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114930 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>WSDL Import Failed<br /></span>
      <h3>Description</h3>
      <span>WSDL schema file could not be imported and cannot be used during the scan.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114930">https://www.tenable.com/plugins/was/114930</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WSDL Import Success]]></title>
            <link>https://www.tenable.com/plugins/was/114929</link>
            <guid>https://www.tenable.com/plugins/was/114929</guid>
            <pubDate>Tue, 19 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114929 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>WSDL Import Success<br /></span>
      <h3>Description</h3>
      <span>WSDL schema file was successfully imported and can be used during the scan.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114929">https://www.tenable.com/plugins/was/114929</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Liferay Portal 7.4.x < 7.4.3.133 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114945</link>
            <guid>https://www.tenable.com/plugins/was/114945</guid>
            <pubDate>Wed, 13 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114945 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Liferay Portal 7.4.x < 7.4.3.133 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>Liferay Portal versions 7.4.x prior to 7.4.3.133 and DXP versions prior to 2024.Q1.16 or 2025.Q1.x prior to 2025.Q1.5 or 2025.Q2.x prior to 2025.Q2.0 are affected by a Cross-Site Scripting allowing an remote non-authenticated attacker to inject JavaScript into the modules/apps/marketplace/marketplace-app-manager-web.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Liferay Portal version 7.4.3.133 or DXP 2024.Q1.16 or DXP 2025.Q1.5 or 2025.Q2.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114945">https://www.tenable.com/plugins/was/114945</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Liferay Portal 7.4.x < 7.4.3.132 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114944</link>
            <guid>https://www.tenable.com/plugins/was/114944</guid>
            <pubDate>Wed, 13 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114944 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Liferay Portal 7.4.x < 7.4.3.132 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>Liferay Portal versions 7.4.x prior to 7.4.3.132 and DXP versions prior to 2024.Q1.13 or 2024.Q2 prior to 2024.Q4.6 are affected by a Cross-Site Scripting allowing an remote non-authenticated attacker to inject JavaScript into the modules/apps/marketplace/marketplace-app-manager-web.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Liferay Portal version 7.4.3.132 or DXP 2024.Q1.13 or DXP 2024.Q4.6 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114944">https://www.tenable.com/plugins/was/114944</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Rejetto HTTP File Server < 2.3c Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114943</link>
            <guid>https://www.tenable.com/plugins/was/114943</guid>
            <pubDate>Mon, 11 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114943 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Rejetto HTTP File Server < 2.3c Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>Rejetto HTTP File Server versions prior to 2.3c, is vulnerable to a remote code execution. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary commands on the affected system by sending a specially crafted HTTP request.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Rejetto HTTP File Server 3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114943">https://www.tenable.com/plugins/was/114943</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Active! Mail < 6.60.05008562 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114942</link>
            <guid>https://www.tenable.com/plugins/was/114942</guid>
            <pubDate>Mon, 11 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114942 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Active! Mail < 6.60.05008562 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of Active! Mail running on the remote host is < 6.60.05008562. It is, therefore, affected by a Remote Code Execution through a a stack-based buffer overflow vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Active! Mail version 6.60.05008562 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114942">https://www.tenable.com/plugins/was/114942</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[NVIDIA Triton < 25.07 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114941</link>
            <guid>https://www.tenable.com/plugins/was/114941</guid>
            <pubDate>Mon, 11 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114941 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>NVIDIA Triton < 25.07 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of NVIDIA Triton running on the remote host is < 25.07. It is, therefore, affected by multiples vulnerabilities :<br /></span><span><br /></span><span>- Multiples stack buffer overflow through specially crafted request.<br /></span><span><br /></span><span>- Multiples remote code execution vulnerabilities through specially crafted request.<br /></span><span><br /></span><span>- An information disclosure through a very large request<br /></span><span><br /></span><span>- Multiples denial of service vulnerabilities through specially crafted request.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to NVIDIA Triton version 25.07 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114941">https://www.tenable.com/plugins/was/114941</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[NVIDIA Triton Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114940</link>
            <guid>https://www.tenable.com/plugins/was/114940</guid>
            <pubDate>Mon, 11 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114940 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>NVIDIA Triton Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected a publicly accessible NVIDIA Triton instance on the target application. NVIDIA Triton provides an optimized cloud and edge inferencing solution. This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114940">https://www.tenable.com/plugins/was/114940</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[ClearML < 1.16.0 Unauthenticated File Access]]></title>
            <link>https://www.tenable.com/plugins/was/114939</link>
            <guid>https://www.tenable.com/plugins/was/114939</guid>
            <pubDate>Mon, 11 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114939 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>ClearML < 1.16.0 Unauthenticated File Access<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of ClearML running on the remote host is < 1.16.0. It is, therefore, affected by an Unauthenticated File Access due to the lack of authentication of the fileserver component.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to ClearML version 1.16.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114939">https://www.tenable.com/plugins/was/114939</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[ClearML Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114938</link>
            <guid>https://www.tenable.com/plugins/was/114938</guid>
            <pubDate>Mon, 11 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114938 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>ClearML Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected a publicly accessible ClearML instance on the target application. ClearML is an infrastructure platform for AI builders. This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114938">https://www.tenable.com/plugins/was/114938</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[ZenML Insufficient Session Expiration]]></title>
            <link>https://www.tenable.com/plugins/was/114937</link>
            <guid>https://www.tenable.com/plugins/was/114937</guid>
            <pubDate>Tue, 05 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114937 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>ZenML Insufficient Session Expiration<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of BentoML running on the remote host is 1.4.x < 1.4.8. It is, therefore, affected by a Server-Side Request Forgery (SSRF) vulnerability in File Upload Processing. "According to its banner, the version of ZenML hosted on the remote is, affected by an Insufficient Session Expiration.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Restricting access to ZenML.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114937">https://www.tenable.com/plugins/was/114937</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[ZenML < 0.57.0 Account Takeover]]></title>
            <link>https://www.tenable.com/plugins/was/114936</link>
            <guid>https://www.tenable.com/plugins/was/114936</guid>
            <pubDate>Tue, 05 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114936 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>ZenML < 0.57.0 Account Takeover<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of ZenML running on the remote host is < 0.57.0. It is, therefore, affected by an Account Takeover due to the lack of rate-limiting in the password change function.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to ZenML version 0.57.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114936">https://www.tenable.com/plugins/was/114936</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Advantive Veracore < 2025.1.1.3 SQL Injection]]></title>
            <link>https://www.tenable.com/plugins/was/114935</link>
            <guid>https://www.tenable.com/plugins/was/114935</guid>
            <pubDate>Tue, 05 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114935 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Advantive Veracore < 2025.1.1.3 SQL Injection<br /></span>
      <h3>Description</h3>
      <span>Advantive Veracore version prior to 2025.1.1.3 is vulnerable to SQL Injection in timeoutWarning.asp functionality, allowing attackers to execute arbitrary SQL queries via the PmSess1 parameter.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Advantive Veracore 2025.1.1.3 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114935">https://www.tenable.com/plugins/was/114935</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[BentoML 1.3.4 < 1.4.3 Insecure Deserialization]]></title>
            <link>https://www.tenable.com/plugins/was/114934</link>
            <guid>https://www.tenable.com/plugins/was/114934</guid>
            <pubDate>Tue, 05 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114934 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>BentoML 1.3.4 < 1.4.3 Insecure Deserialization<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of BentoML running on the remote host is 1.3.4 < 1.4.3. It is, therefore, affected by an Insecure Deserialization vulnerability through data flow analysis<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to BentoML version 1.3.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114934">https://www.tenable.com/plugins/was/114934</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[BentoML 1.x < 1.4.8 Insecure Deserialization]]></title>
            <link>https://www.tenable.com/plugins/was/114933</link>
            <guid>https://www.tenable.com/plugins/was/114933</guid>
            <pubDate>Tue, 05 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114933 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>BentoML 1.x < 1.4.8 Insecure Deserialization<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of BentoML running on the remote host is 1.x < 1.4.8. It is, therefore, affected by an Insecure Deserialization vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to BentoML version 1.4.8 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114933">https://www.tenable.com/plugins/was/114933</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[BentoML 1.4.x < 1.4.19 Server-Side Request Forgery]]></title>
            <link>https://www.tenable.com/plugins/was/114932</link>
            <guid>https://www.tenable.com/plugins/was/114932</guid>
            <pubDate>Tue, 05 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114932 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>BentoML 1.4.x < 1.4.19 Server-Side Request Forgery<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of BentoML running on the remote host is 1.4.x < 1.4.8. It is, therefore, affected by a Server-Side Request Forgery (SSRF) vulnerability in File Upload Processing.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to BentoML version 1.4.19 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114932">https://www.tenable.com/plugins/was/114932</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Squid < 6.4 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114931</link>
            <guid>https://www.tenable.com/plugins/was/114931</guid>
            <pubDate>Tue, 05 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114931 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Squid < 6.4 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number,the version of Squid installed on the remote host is 5.x < 5.0.4 or prior to 4.13. It is, therefore, affected by a heap buffer overflow and possible remote code execution attack when processing URN.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Squid version 6.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114931">https://www.tenable.com/plugins/was/114931</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MCP Server Prompt Injection]]></title>
            <link>https://www.tenable.com/plugins/was/114928</link>
            <guid>https://www.tenable.com/plugins/was/114928</guid>
            <pubDate>Thu, 31 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114928 with High Severity</p>
      <h3>Synopsis</h3>
      <span>MCP Server Prompt Injection<br /></span>
      <h3>Description</h3>
      <span>Model Context Protocol (MCP) Server Prompt Injection occurs when malicious actors use tools response to inject malicious prompts to the calling LLM through the MCP client. This can lead to the execution of unauthorized commands, data corruption, or the deployment of malicious tools. Such vulnerabilities are particularly dangerous in AI development environments, where malicious tools can compromise the integrity of the development process and lead to further exploitation. This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span>Review MCP server tools behaviour to ensure that they do not return malicious configurations or commands. Implement strict validation and sanitization of tool metadata to prevent the execution of unauthorized commands or sensitive action. Regularly audit MCP server configurations and tools to detect and mitigate potential injection attempts.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114928">https://www.tenable.com/plugins/was/114928</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[BentoML Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114927</link>
            <guid>https://www.tenable.com/plugins/was/114927</guid>
            <pubDate>Thu, 31 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114927 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>BentoML Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected a publicly accessible BentoML instance on the target application. BentoML is an open-source inference platform. This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114927">https://www.tenable.com/plugins/was/114927</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Lighthouse Studio < 9.16.14 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114926</link>
            <guid>https://www.tenable.com/plugins/was/114926</guid>
            <pubDate>Mon, 28 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114926 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Lighthouse Studio < 9.16.14 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>Lighthouse Studio version 9.16.3 and earlier is vulnerable to a remote code execution through the ciwweb.pl Perl web application. This vulnerability allows an attacker to execute arbitrary code on the server by sending a specially crafted request to the ciwweb.pl script.<br /></span>
      <h3>Solution</h3>
      <span>Lighthouse Studio version 9.16.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114926">https://www.tenable.com/plugins/was/114926</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Wing FTP < 7.4.4 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114925</link>
            <guid>https://www.tenable.com/plugins/was/114925</guid>
            <pubDate>Mon, 28 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114925 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Wing FTP < 7.4.4 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>Wing FTP version 7.4.2 and earlier is vulnerable to a remote code execution vulnerability due to improper handling of null characters in file paths. An attacker can exploit this vulnerability by sending a specially crafted request that includes a null character, allowing them to execute arbitrary commands on the server.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Wing FTP version 7.4.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114925">https://www.tenable.com/plugins/was/114925</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache 2.4.64 RewriteCond expr Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/was/114924</link>
            <guid>https://www.tenable.com/plugins/was/114924</guid>
            <pubDate>Thu, 24 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114924 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Apache 2.4.64 RewriteCond expr Vulnerability<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of Apache running on the remote host is 2.4.64. It is, therefore, affected by a bug which results in all "RewriteCond expr ..." tests evaluating as "true".<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache version 2.4.65 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114924">https://www.tenable.com/plugins/was/114924</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114923</link>
            <guid>https://www.tenable.com/plugins/was/114923</guid>
            <pubDate>Thu, 24 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114923 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>Microsoft SharePoint Server Subscription Edition < 16.0.18526.20508 or 2016 < 16.0.5513.1001 or 2019 < 16.0.10417.20037 is affected by a vulnerability that allows an unauthenticated attacker to execute arbitrary code through insecure deserialization.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft Server Subscription Edition build 16.0.18526.20508 or SharePoint Server 2016 build 16.0.5513.1001 or 2019 build 16.0.10417.20037 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114923">https://www.tenable.com/plugins/was/114923</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fortinet FortiWeb Fabric Connector SQL Injection]]></title>
            <link>https://www.tenable.com/plugins/was/114922</link>
            <guid>https://www.tenable.com/plugins/was/114922</guid>
            <pubDate>Thu, 24 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114922 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Fortinet FortiWeb Fabric Connector SQL Injection<br /></span>
      <h3>Description</h3>
      <span>Fortinet FortiWeb 7.0.x < 7.0.11, 7.2.x < 7.2.11, 7.4.x < 7.4.8, 7.6.x < 7.6.4 is vulnerable to a pre-authentication SQL injection that can lead to remote code execution. By leveraging this vulnerability, a remote and unauthenticated attacker can inject malicious SQL queries into the FortiWeb Fabric Connector and fully compromise the affected system.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to FortiWeb 7.0.11, 7.2.11, 7.4.8, or 7.6.4 or later versions to mitigate this vulnerability.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114922">https://www.tenable.com/plugins/was/114922</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MCP Server Tool Poisoning]]></title>
            <link>https://www.tenable.com/plugins/was/114921</link>
            <guid>https://www.tenable.com/plugins/was/114921</guid>
            <pubDate>Fri, 18 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114921 with High Severity</p>
      <h3>Synopsis</h3>
      <span>MCP Server Tool Poisoning<br /></span>
      <h3>Description</h3>
      <span>Model Context Protocol (MCP) Server Tool Poisoning occurs when malicious actors manipulate tool configurations or metadata on a malicious MCP server. This can lead to the execution of unauthorized commands, data corruption, or the deployment of malicious tools. Such vulnerabilities are particularly dangerous in AI development environments, where poisoned tools can compromise the integrity of the development process and lead to further exploitation. This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span>Review MCP server tools metadata to ensure that they do not contain malicious configurations or commands. Implement strict validation and sanitization of tool metadata to prevent the execution of unauthorized commands or sensitive action. Regularly audit MCP server configurations and tools to detect and mitigate potential poisoning attempts.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114921">https://www.tenable.com/plugins/was/114921</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OAuth Dynamic Client Registration Permissive Metadata Field]]></title>
            <link>https://www.tenable.com/plugins/was/114920</link>
            <guid>https://www.tenable.com/plugins/was/114920</guid>
            <pubDate>Fri, 18 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114920 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>OAuth Dynamic Client Registration Permissive Metadata Field<br /></span>
      <h3>Description</h3>
      <span>OAuth Dynamic Client Registration allows for various metadata fields such as 'client_name', 'website_uri' during the registration process. When the OAuth server accepts permissive values for such fields, such as ones starting with javascript://, an attacker could exploit this to perform Cross-Site Scripting (XSS) attacks. OAuth Dynamic Client Registration is very common in the context of Model Context Protocol (MCP) servers, allowing attackers to target AI developers<br /></span>
      <h3>Solution</h3>
      <span>Enforce strict validation on URLs to ensure they are only using https:// scheme.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114920">https://www.tenable.com/plugins/was/114920</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OAuth Dynamic Client Registration Permissive Redirect URI]]></title>
            <link>https://www.tenable.com/plugins/was/114919</link>
            <guid>https://www.tenable.com/plugins/was/114919</guid>
            <pubDate>Fri, 18 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114919 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>OAuth Dynamic Client Registration Permissive Redirect URI<br /></span>
      <h3>Description</h3>
      <span>OAuth Dynamic Client Registration requires specifying redirect URIs during the registration process. When the OAuth server accepts permissive redirect URIs, such as those allowing arbitrary hosts or ones starting with javascript://, an attacker could exploit this to perform Open Redirect or Cross-Site Scripting (XSS) attacks. OAuth Dynamic Client Registration is very common in the context of Model Context Protocol (MCP) servers, allowing attackers to target AI developers.<br /></span>
      <h3>Solution</h3>
      <span>Restrict the allowed redirect URIs to specific trusted domains and ensure they do not allow arbitrary hosts and schemes other than https://<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114919">https://www.tenable.com/plugins/was/114919</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OAuth Dynamic Client Registration Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114918</link>
            <guid>https://www.tenable.com/plugins/was/114918</guid>
            <pubDate>Fri, 18 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114918 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>OAuth Dynamic Client Registration Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected a publicly accessible OAuth Dynamic Client Registration endpoint on the target application. OAuth Dynamic Client Registration allows clients to register dynamically with an authorization server and is very common in the context of Model Context Protocol (MCP) servers used for AI development.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that allowing OAuth client dynamic registration is expected on the target application.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114918">https://www.tenable.com/plugins/was/114918</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache 2.4.x < 2.4.64 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114917</link>
            <guid>https://www.tenable.com/plugins/was/114917</guid>
            <pubDate>Fri, 18 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114917 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Apache 2.4.x < 2.4.64 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.64. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span> - HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response. (CVE-2024-42516)<br /></span><span><br /></span><span> - Server-Side Request Forgery (SSRF) in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. (CVE-2024-43204)<br /></span><span><br /></span><span> - Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via mod_rewrite or apache expressions that pass unvalidated request input. (CVE-2024-43394)<br /></span><span><br /></span><span> - Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. (CVE-2024-47252)<br /></span><span><br /></span><span> - In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.62, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. (CVE-2025-23048)<br /></span><span><br /></span><span> - In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2. (CVE-2025-49630)<br /></span><span><br /></span><span> - In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade. (CVE-2025-49812)<br /></span><span><br /></span><span> - Late Release of Memory after Effective Lifetime vulnerability in Apache HTTP Server. (CVE-2025-53020) Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache version 2.4.64 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114917">https://www.tenable.com/plugins/was/114917</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 9.0.0-M1 < 9.0.107 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114916</link>
            <guid>https://www.tenable.com/plugins/was/114916</guid>
            <pubDate>Fri, 18 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114916 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 9.0.0-M1 < 9.0.107 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.107, 10.1.0-M1 prior to 10.1.43 or 11.0.0-M1 prior to 11.0.9. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A race condition on connection close could trigger a JVM crash when using the APR/Native connector leading to a DoS. This was particularly noticeable with client initiated closes of HTTP/2 connections. (CVE-2025-52434)<br /></span><span><br /></span><span> - For some unlikely configurations of multipart upload, an Integer Overflow vulnerability could lead to a DoS via bypassing of size limits. (CVE-2025-52520)<br /></span><span><br /></span><span> - An uncontrolled resource consumption vulnerability if an HTTP/2 client did not acknowledge the initial settings frame that reduces the maximum permitted concurrent streams could result in a DoS. (CVE-2025-53506)<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.107 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114916">https://www.tenable.com/plugins/was/114916</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 10.1.0-M1 < 10.1.43 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114915</link>
            <guid>https://www.tenable.com/plugins/was/114915</guid>
            <pubDate>Fri, 18 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114915 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 10.1.0-M1 < 10.1.43 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.107, 10.1.0-M1 prior to 10.1.43 or 11.0.0-M1 prior to 11.0.9. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A race condition on connection close could trigger a JVM crash when using the APR/Native connector leading to a DoS. This was particularly noticeable with client initiated closes of HTTP/2 connections. (CVE-2025-52434)<br /></span><span><br /></span><span> - For some unlikely configurations of multipart upload, an Integer Overflow vulnerability could lead to a DoS via bypassing of size limits. (CVE-2025-52520)<br /></span><span><br /></span><span> - An uncontrolled resource consumption vulnerability if an HTTP/2 client did not acknowledge the initial settings frame that reduces the maximum permitted concurrent streams could result in a DoS. (CVE-2025-53506)<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.43 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114915">https://www.tenable.com/plugins/was/114915</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 11.0.0-M1 < 11.0.9 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114914</link>
            <guid>https://www.tenable.com/plugins/was/114914</guid>
            <pubDate>Fri, 18 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114914 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 11.0.0-M1 < 11.0.9 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.107, 10.1.0-M1 prior to 10.1.43 or 11.0.0-M1 prior to 11.0.9. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A race condition on connection close could trigger a JVM crash when using the APR/Native connector leading to a DoS. This was particularly noticeable with client initiated closes of HTTP/2 connections. (CVE-2025-52434)<br /></span><span><br /></span><span> - For some unlikely configurations of multipart upload, an Integer Overflow vulnerability could lead to a DoS via bypassing of size limits. (CVE-2025-52520)<br /></span><span><br /></span><span> - An uncontrolled resource consumption vulnerability if an HTTP/2 client did not acknowledge the initial settings frame that reduces the maximum permitted concurrent streams could result in a DoS. (CVE-2025-53506)<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 11.0.9 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114914">https://www.tenable.com/plugins/was/114914</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[XWiki User Registration Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114913</link>
            <guid>https://www.tenable.com/plugins/was/114913</guid>
            <pubDate>Fri, 18 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114913 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>XWiki User Registration Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>XWiki Platform versions from 2.2 before 14.10.17, from 15.0-rc-1 before 15.5.3, and from 15.6-rc-1 before 15.8-rc-1 suffer from a Server-Side Template Injection (SSTI) due to the lack of sanitization of the user registration form's inputs. By leveraging this vulnerability, a remote and unauthenticated attacker can achieve privilege escalation and achieve code execution on the vulnerable XWiki instance.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade XWiki to version 14.10.17, 15.5.3, 15.8-rc-1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114913">https://www.tenable.com/plugins/was/114913</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[XWiki Platform SolrSearch Macro Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114912</link>
            <guid>https://www.tenable.com/plugins/was/114912</guid>
            <pubDate>Thu, 10 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114912 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>XWiki Platform SolrSearch Macro Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>XWiki Platform versions from 5.3-milestone-2 before 15.10.11 and from 16.0.0-rc-1 before 16.4.1 suffer from a Server-Side Template Injection (SSTI) due to the lack of sanitization of the SolrSearch Macro requests. By leveraging this vulnerability, a remote and unauthenticated attacker can achieve privilege escalation and achieve code execution on the vulnerable XWiki instance.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade XWiki to version 15.10.11, 16.4.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114912">https://www.tenable.com/plugins/was/114912</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[PHP 8.1.x < 8.1.33 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114911</link>
            <guid>https://www.tenable.com/plugins/was/114911</guid>
            <pubDate>Thu, 10 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114911 with High Severity</p>
      <h3>Synopsis</h3>
      <span>PHP 8.1.x < 8.1.33 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the version of PHP installed on the remote host is 8.1.x prior to 8.1.33, 8.2.x prior to 8.2.29, 8.3.x prior to 8.3.23, or 8.4.x prior to 8.4.10. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span> - pgsql extension does not check for errors during escaping. (CVE-2025-1735)<br /></span><span><br /></span><span> - NULL Pointer Dereference in PHP SOAP Extension via Large XML Namespace Prefix. (CVE-2025-6491)<br /></span><span><br /></span><span> - Null byte termination in hostnames. (CVE-2025-1220) Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to PHP version 8.1.33 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114911">https://www.tenable.com/plugins/was/114911</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[PHP 8.2.x < 8.2.29 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114910</link>
            <guid>https://www.tenable.com/plugins/was/114910</guid>
            <pubDate>Thu, 10 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114910 with High Severity</p>
      <h3>Synopsis</h3>
      <span>PHP 8.2.x < 8.2.29 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the version of PHP installed on the remote host is 8.1.x prior to 8.1.33, 8.2.x prior to 8.2.29, 8.3.x prior to 8.3.23, or 8.4.x prior to 8.4.10. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span> - pgsql extension does not check for errors during escaping. (CVE-2025-1735)<br /></span><span><br /></span><span> - NULL Pointer Dereference in PHP SOAP Extension via Large XML Namespace Prefix. (CVE-2025-6491)<br /></span><span><br /></span><span> - Null byte termination in hostnames. (CVE-2025-1220) Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to PHP version 8.2.29 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114910">https://www.tenable.com/plugins/was/114910</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[PHP 8.3.x < 8.3.23 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114909</link>
            <guid>https://www.tenable.com/plugins/was/114909</guid>
            <pubDate>Thu, 10 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114909 with High Severity</p>
      <h3>Synopsis</h3>
      <span>PHP 8.3.x < 8.3.23 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the version of PHP installed on the remote host is 8.1.x prior to 8.1.33, 8.2.x prior to 8.2.29, 8.3.x prior to 8.3.23, or 8.4.x prior to 8.4.10. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span> - pgsql extension does not check for errors during escaping. (CVE-2025-1735)<br /></span><span><br /></span><span> - NULL Pointer Dereference in PHP SOAP Extension via Large XML Namespace Prefix. (CVE-2025-6491)<br /></span><span><br /></span><span> - Null byte termination in hostnames. (CVE-2025-1220) Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to PHP version 8.3.23 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114909">https://www.tenable.com/plugins/was/114909</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[PHP 8.4.x < 8.4.10 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114908</link>
            <guid>https://www.tenable.com/plugins/was/114908</guid>
            <pubDate>Thu, 10 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114908 with High Severity</p>
      <h3>Synopsis</h3>
      <span>PHP 8.4.x < 8.4.10 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the version of PHP installed on the remote host is 8.1.x prior to 8.1.33, 8.2.x prior to 8.2.29, 8.3.x prior to 8.3.23, or 8.4.x prior to 8.4.10. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span> - pgsql extension does not check for errors during escaping. (CVE-2025-1735)<br /></span><span><br /></span><span> - NULL Pointer Dereference in PHP SOAP Extension via Large XML Namespace Prefix. (CVE-2025-6491)<br /></span><span><br /></span><span> - Null byte termination in hostnames. (CVE-2025-1220) Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to PHP version 8.4.10 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114908">https://www.tenable.com/plugins/was/114908</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Citrix NetScaler Gateway / ADC Memory Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/114907</link>
            <guid>https://www.tenable.com/plugins/was/114907</guid>
            <pubDate>Thu, 10 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114907 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Citrix NetScaler Gateway / ADC Memory Disclosure<br /></span>
      <h3>Description</h3>
      <span>Citrix NetScaler Gateway / ADC versions 14.1.x < 14.1-43.56, 13.1.x < 13.1-58.32, 13.1.x-FIPS < 13.1-37.235-FIPS and NDcPP, 12.1.x-FIPS < 12.1-55.328-FIPS, 12.1.x and 13.0.x are affected by a memory disclosure vulnerability. This issue could allow a remote and unauthenticated attacker to access sensitive information without authorization.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to version 14.1-43.56, 13.1-58.32, 13.1-37.235-FIPS, 12.1-55.328-FIPS or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114907">https://www.tenable.com/plugins/was/114907</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MCP Inspector < 0.14.1 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114906</link>
            <guid>https://www.tenable.com/plugins/was/114906</guid>
            <pubDate>Fri, 04 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114906 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>MCP Inspector < 0.14.1 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>According to the self-reported version number, the version of MCP Inspector hosted on the remote is affected by a Remote Code Execution vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span><span><br /></span><span>This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to version 0.14.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114906">https://www.tenable.com/plugins/was/114906</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[DocsGPT 0.8.1 < 0.13.0 Unauthenticated Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114905</link>
            <guid>https://www.tenable.com/plugins/was/114905</guid>
            <pubDate>Thu, 03 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114905 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>DocsGPT 0.8.1 < 0.13.0 Unauthenticated Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>DocsGPT is vulnerable to an attack allowing an unauthenticated attacker to execute arbitrary code via a specially forged request on the '/api/remote' endpoint. This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to DocsGPT version 0.13.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114905">https://www.tenable.com/plugins/was/114905</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[DocsGPT Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114904</link>
            <guid>https://www.tenable.com/plugins/was/114904</guid>
            <pubDate>Thu, 03 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114904 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>DocsGPT Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected a publicly accessible DocsGPT instance on the target application. DocsGPT is an open-source genAI tool that helps users get answers from knowledge source. This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access using a .htaccess file, limiting access to known IP Addresses.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114904">https://www.tenable.com/plugins/was/114904</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft Exchange Admin Center Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114903</link>
            <guid>https://www.tenable.com/plugins/was/114903</guid>
            <pubDate>Thu, 03 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114903 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft Exchange Admin Center Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected a publicly accessible Microsoft Exchange Admin Center instance on the target application.<br /></span>
      <h3>Solution</h3>
      <span>If the application is not expected to be public, restrict access using a .htaccess file, limiting access to known IP Addresses.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114903">https://www.tenable.com/plugins/was/114903</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Bootstrap Unsupported Version]]></title>
            <link>https://www.tenable.com/plugins/was/114902</link>
            <guid>https://www.tenable.com/plugins/was/114902</guid>
            <pubDate>Thu, 03 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114902 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Bootstrap Unsupported Version<br /></span>
      <h3>Description</h3>
      <span>The installation of Boostrap detected on the remote host is no longer supported. Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it is likely to contain security vulnerabilities.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to a supported version of Bootstrap.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114902">https://www.tenable.com/plugins/was/114902</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Bootstrap 3.2.x <= 3.4.1 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114901</link>
            <guid>https://www.tenable.com/plugins/was/114901</guid>
            <pubDate>Thu, 03 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114901 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Bootstrap 3.2.x <= 3.4.1 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, Bootstrap is 3.2.x prior 3.4.1 . Therefore, it may be affected by a Cross-Site Scripting (XSS) vulnerability within the Carousel component.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Bootstrap version 5.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114901">https://www.tenable.com/plugins/was/114901</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Bootstrap < 4.0.0 Multiples Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114900</link>
            <guid>https://www.tenable.com/plugins/was/114900</guid>
            <pubDate>Thu, 03 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114900 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Bootstrap < 4.0.0 Multiples Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, Bootstrap is prior to 4.0.0. Therefore, it may be affected by Multiples Cross-Site Scripting (XSS) vulnerability :<br /></span><span><br /></span><span>- A Cross-Site Scripting (XSS) vulnerability has been identified within the Bootstrap 3 Button component.<br /></span><span><br /></span><span>- A Cross-Site Scripting (XSS) vulnerability has been identified within the Bootstrap 3 Popover component and Bootstrap 3 Tooltip component, which allows unsanitized HTML to be used.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Bootstrap version 4.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114900">https://www.tenable.com/plugins/was/114900</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Bootstrap 4.x <= 4.6.2 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114899</link>
            <guid>https://www.tenable.com/plugins/was/114899</guid>
            <pubDate>Thu, 03 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114899 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Bootstrap 4.x <= 4.6.2 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, Bootstrap is 4.x prior 4.6.2 . Therefore, it may be affected by a Cross-Site Scripting (XSS) vulnerability within the Carousel component.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Bootstrap version 5.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114899">https://www.tenable.com/plugins/was/114899</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 5.x < 5.0.1 Reflected XSS In MathJax]]></title>
            <link>https://www.tenable.com/plugins/was/114898</link>
            <guid>https://www.tenable.com/plugins/was/114898</guid>
            <pubDate>Tue, 24 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114898 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 5.x < 5.0.1 Reflected XSS In MathJax<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 5.x prior to 5.0.1 . It is, therefore, affected by a Reflected Cross-Site Scripting in MathJax.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 5.0.1 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114898">https://www.tenable.com/plugins/was/114898</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.5.x < 4.5.4 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114897</link>
            <guid>https://www.tenable.com/plugins/was/114897</guid>
            <pubDate>Tue, 24 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114897 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.5.x < 4.5.4 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.1.x prior to 4.1.18 or 4.3.x prior to 4.3.12 or 4.4.x prior to 4.4.8 or 4.5.x prior to 4.5.4. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span>- Additional checks were required to ensure users can only fetch cohort data they are intended to have access to.<br /></span><span><br /></span><span>- Insufficient capability checks in a messaging web service made it possible to view other users' names and online status.<br /></span><span><br /></span><span>- Additional checks were required to prevent users deleting course sections they did not have permission to modify.<br /></span><span><br /></span><span>- The return URL in the policy tool required extra sanitizing to prevent a reflected XSS risk.<br /></span><span><br /></span><span>- A remote code execution risk was identified in the Moodle LMS EQUELLA repository. By default this was only available to teachers and managers, on sites with the EQUELLA repository enabled.<br /></span><span><br /></span><span>- A remote code execution risk was identified in the Moodle LMS Dropbox repository. By default this was only available to teachers and managers, on sites with the Dropbox repository enabled.<br /></span><span><br /></span><span>- Insufficient capability checks made it possible for a user enrolled in a course to access some details (full name and profile image URL) of other users they did not have permission to access.<br /></span><span><br /></span><span>- The analysis request action in the Brickfield tool did not include the necessary token to prevent a CSRF risk.<br /></span><span><br /></span><span>- A user's CSRF token was unnecessarily included in the URL on the database module's edit and delete pages.<br /></span><span><br /></span><span>- Insufficient capability checks made it possible to view RSS feed content a user does not have permission to access.<br /></span><span><br /></span><span>- The user tours duplicate tour action did not include the necessary token to prevent a CSRF risk.<br /></span><span><br /></span><span>- On sites with Multi-Factor Authentication enabled, it was possible to use course self enrolment after passing only the first login factor (such as passing a username/password check). The user should also have to pass a second login factor before gaining access to self enrolment.<br /></span><span><br /></span><span>- Additional capability checks were required to prevent teachers from being able to identify a user's anonymous assignment submissions via the submissions search.<br /></span><span><br /></span><span>- On sites with Multi-Factor Authentication enabled, it was possible for a user to access some of their data after passing only the first login factor (such as passing a username/password check). The user should have to also pass a second factor check before gaining access to that data.<br /></span><span><br /></span><span>- A missing check in the Multi-Factor Authentication email factor's revoke/cancel action could lead to a Denial of Service risk for users logging in who have email as their only available second factor. If exploited, the impacted user's name was disclosed.<br /></span><span><br /></span><span>- Insufficient sanitizing in an undocumented MimeTeX command resulted in a remote code execution risk for sites using MimeTeX (via the TeX Notation filter).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Moodle version 4.5.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114897">https://www.tenable.com/plugins/was/114897</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.4.x < 4.4.8 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114896</link>
            <guid>https://www.tenable.com/plugins/was/114896</guid>
            <pubDate>Tue, 24 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114896 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.4.x < 4.4.8 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.1.x prior to 4.1.18 or 4.3.x prior to 4.3.12 or 4.4.x prior to 4.4.8 or 4.5.x prior to 4.5.4. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span>- Additional checks were required to ensure users can only fetch cohort data they are intended to have access to.<br /></span><span><br /></span><span>- Insufficient capability checks in a messaging web service made it possible to view other users' names and online status.<br /></span><span><br /></span><span>- Additional checks were required to prevent users deleting course sections they did not have permission to modify.<br /></span><span><br /></span><span>- The return URL in the policy tool required extra sanitizing to prevent a reflected XSS risk.<br /></span><span><br /></span><span>- A remote code execution risk was identified in the Moodle LMS EQUELLA repository. By default this was only available to teachers and managers, on sites with the EQUELLA repository enabled.<br /></span><span><br /></span><span>- A remote code execution risk was identified in the Moodle LMS Dropbox repository. By default this was only available to teachers and managers, on sites with the Dropbox repository enabled.<br /></span><span><br /></span><span>- Insufficient capability checks made it possible for a user enrolled in a course to access some details (full name and profile image URL) of other users they did not have permission to access.<br /></span><span><br /></span><span>- The analysis request action in the Brickfield tool did not include the necessary token to prevent a CSRF risk.<br /></span><span><br /></span><span>- A user's CSRF token was unnecessarily included in the URL on the database module's edit and delete pages.<br /></span><span><br /></span><span>- Insufficient capability checks made it possible to view RSS feed content a user does not have permission to access.<br /></span><span><br /></span><span>- The user tours duplicate tour action did not include the necessary token to prevent a CSRF risk.<br /></span><span><br /></span><span>- On sites with Multi-Factor Authentication enabled, it was possible to use course self enrolment after passing only the first login factor (such as passing a username/password check). The user should also have to pass a second login factor before gaining access to self enrolment.<br /></span><span><br /></span><span>- Additional capability checks were required to prevent teachers from being able to identify a user's anonymous assignment submissions via the submissions search.<br /></span><span><br /></span><span>- On sites with Multi-Factor Authentication enabled, it was possible for a user to access some of their data after passing only the first login factor (such as passing a username/password check). The user should have to also pass a second factor check before gaining access to that data.<br /></span><span><br /></span><span>- A missing check in the Multi-Factor Authentication email factor's revoke/cancel action could lead to a Denial of Service risk for users logging in who have email as their only available second factor. If exploited, the impacted user's name was disclosed.<br /></span><span><br /></span><span>- Insufficient sanitizing in an undocumented MimeTeX command resulted in a remote code execution risk for sites using MimeTeX (via the TeX Notation filter).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Moodle version 4.4.8 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114896">https://www.tenable.com/plugins/was/114896</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.3.x < 4.3.12 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114895</link>
            <guid>https://www.tenable.com/plugins/was/114895</guid>
            <pubDate>Tue, 24 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114895 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.3.x < 4.3.12 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.1.x prior to 4.1.18 or 4.3.x prior to 4.3.12 or 4.4.x prior to 4.4.8 or 4.5.x prior to 4.5.4. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span>- Additional checks were required to ensure users can only fetch cohort data they are intended to have access to.<br /></span><span><br /></span><span>- Insufficient capability checks in a messaging web service made it possible to view other users' names and online status.<br /></span><span><br /></span><span>- Additional checks were required to prevent users deleting course sections they did not have permission to modify.<br /></span><span><br /></span><span>- The return URL in the policy tool required extra sanitizing to prevent a reflected XSS risk.<br /></span><span><br /></span><span>- A remote code execution risk was identified in the Moodle LMS EQUELLA repository. By default this was only available to teachers and managers, on sites with the EQUELLA repository enabled.<br /></span><span><br /></span><span>- A remote code execution risk was identified in the Moodle LMS Dropbox repository. By default this was only available to teachers and managers, on sites with the Dropbox repository enabled.<br /></span><span><br /></span><span>- Insufficient capability checks made it possible for a user enrolled in a course to access some details (full name and profile image URL) of other users they did not have permission to access.<br /></span><span><br /></span><span>- The analysis request action in the Brickfield tool did not include the necessary token to prevent a CSRF risk.<br /></span><span><br /></span><span>- A user's CSRF token was unnecessarily included in the URL on the database module's edit and delete pages.<br /></span><span><br /></span><span>- Insufficient capability checks made it possible to view RSS feed content a user does not have permission to access.<br /></span><span><br /></span><span>- The user tours duplicate tour action did not include the necessary token to prevent a CSRF risk.<br /></span><span><br /></span><span>- On sites with Multi-Factor Authentication enabled, it was possible to use course self enrolment after passing only the first login factor (such as passing a username/password check). The user should also have to pass a second login factor before gaining access to self enrolment.<br /></span><span><br /></span><span>- Additional capability checks were required to prevent teachers from being able to identify a user's anonymous assignment submissions via the submissions search.<br /></span><span><br /></span><span>- On sites with Multi-Factor Authentication enabled, it was possible for a user to access some of their data after passing only the first login factor (such as passing a username/password check). The user should have to also pass a second factor check before gaining access to that data.<br /></span><span><br /></span><span>- A missing check in the Multi-Factor Authentication email factor's revoke/cancel action could lead to a Denial of Service risk for users logging in who have email as their only available second factor. If exploited, the impacted user's name was disclosed.<br /></span><span><br /></span><span>- Insufficient sanitizing in an undocumented MimeTeX command resulted in a remote code execution risk for sites using MimeTeX (via the TeX Notation filter).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Moodle version 4.3.12 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114895">https://www.tenable.com/plugins/was/114895</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.1.x < 4.1.18 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114894</link>
            <guid>https://www.tenable.com/plugins/was/114894</guid>
            <pubDate>Tue, 24 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114894 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.1.x < 4.1.18 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.1.x prior to 4.1.18 or 4.3.x prior to 4.3.12 or 4.4.x prior to 4.4.8 or 4.5.x prior to 4.5.4. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span>- Additional checks were required to ensure users can only fetch cohort data they are intended to have access to.<br /></span><span><br /></span><span>- Insufficient capability checks in a messaging web service made it possible to view other users' names and online status.<br /></span><span><br /></span><span>- Additional checks were required to prevent users deleting course sections they did not have permission to modify.<br /></span><span><br /></span><span>- The return URL in the policy tool required extra sanitizing to prevent a reflected XSS risk.<br /></span><span><br /></span><span>- A remote code execution risk was identified in the Moodle LMS EQUELLA repository. By default this was only available to teachers and managers, on sites with the EQUELLA repository enabled.<br /></span><span><br /></span><span>- A remote code execution risk was identified in the Moodle LMS Dropbox repository. By default this was only available to teachers and managers, on sites with the Dropbox repository enabled.<br /></span><span><br /></span><span>- Insufficient capability checks made it possible for a user enrolled in a course to access some details (full name and profile image URL) of other users they did not have permission to access.<br /></span><span><br /></span><span>- The analysis request action in the Brickfield tool did not include the necessary token to prevent a CSRF risk.<br /></span><span><br /></span><span>- A user's CSRF token was unnecessarily included in the URL on the database module's edit and delete pages.<br /></span><span><br /></span><span>- Insufficient capability checks made it possible to view RSS feed content a user does not have permission to access.<br /></span><span><br /></span><span>- The user tours duplicate tour action did not include the necessary token to prevent a CSRF risk.<br /></span><span><br /></span><span>- On sites with Multi-Factor Authentication enabled, it was possible to use course self enrolment after passing only the first login factor (such as passing a username/password check). The user should also have to pass a second login factor before gaining access to self enrolment.<br /></span><span><br /></span><span>- Additional capability checks were required to prevent teachers from being able to identify a user's anonymous assignment submissions via the submissions search.<br /></span><span><br /></span><span>- On sites with Multi-Factor Authentication enabled, it was possible for a user to access some of their data after passing only the first login factor (such as passing a username/password check). The user should have to also pass a second factor check before gaining access to that data.<br /></span><span><br /></span><span>- A missing check in the Multi-Factor Authentication email factor's revoke/cancel action could lead to a Denial of Service risk for users logging in who have email as their only available second factor. If exploited, the impacted user's name was disclosed.<br /></span><span><br /></span><span>- Insufficient sanitizing in an undocumented MimeTeX command resulted in a remote code execution risk for sites using MimeTeX (via the TeX Notation filter).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Moodle version 4.1.18 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114894">https://www.tenable.com/plugins/was/114894</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 5.0.x < 5.0.1 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114893</link>
            <guid>https://www.tenable.com/plugins/was/114893</guid>
            <pubDate>Tue, 24 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114893 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 5.0.x < 5.0.1 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.1.x prior to 4.1.19, or 4.4.x prior to 4.4.9, or 4.5.x prior to 4.5.5, or 5.x prior to 5.0.1. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span>- A stricter capability check was required to restrict which users can fetch other users' recently accessed courses information.<br /></span><span><br /></span><span>- Insufficient authorisation checks could result in users being able to view BigBlueButton recordings they did not have permission to access.<br /></span><span><br /></span><span>- The "move up" and "move down" actions in backpack management for badges did not include the necessary token to prevent a CSRF risk.<br /></span><span><br /></span><span>- Insufficient state and capability checks resulted in some details of hidden courses (such as course name, description and teachers) being available to users who did not have permission to access them.<br /></span><span><br /></span><span>- A DNS rebind risk in the way cURL requests were handled could result in an SSRF risk, due to the possibility of cURL blocked hosts / allowed ports site configurations being bypassed.<br /></span><span><br /></span><span>- The upstream ADOdb library contained an SQL injection risk in the pg_insert_id() method. It is important to note that the core Moodle LMS was NOT affected by this vulnerability, however as a precaution, this library has been upgraded to remove the risk entirely, in case any third party code/plugins uses the vulnerable code.<br /></span><span><br /></span><span>- Additional cache controls were required to prevent web browsers caching a user's password on the login page (note accessing this would require access to the web browser on the device where the user had logged in).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Moodle version 5.0.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114893">https://www.tenable.com/plugins/was/114893</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.5.x < 4.5.5 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114892</link>
            <guid>https://www.tenable.com/plugins/was/114892</guid>
            <pubDate>Tue, 24 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114892 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.5.x < 4.5.5 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.1.x prior to 4.1.19, or 4.4.x prior to 4.4.9, or 4.5.x prior to 4.5.5, or 5.x prior to 5.0.1. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span>- A stricter capability check was required to restrict which users can fetch other users' recently accessed courses information.<br /></span><span><br /></span><span>- Insufficient authorisation checks could result in users being able to view BigBlueButton recordings they did not have permission to access.<br /></span><span><br /></span><span>- The "move up" and "move down" actions in backpack management for badges did not include the necessary token to prevent a CSRF risk.<br /></span><span><br /></span><span>- Insufficient state and capability checks resulted in some details of hidden courses (such as course name, description and teachers) being available to users who did not have permission to access them.<br /></span><span><br /></span><span>- A DNS rebind risk in the way cURL requests were handled could result in an SSRF risk, due to the possibility of cURL blocked hosts / allowed ports site configurations being bypassed.<br /></span><span><br /></span><span>- The upstream ADOdb library contained an SQL injection risk in the pg_insert_id() method. It is important to note that the core Moodle LMS was NOT affected by this vulnerability, however as a precaution, this library has been upgraded to remove the risk entirely, in case any third party code/plugins uses the vulnerable code.<br /></span><span><br /></span><span>- Additional cache controls were required to prevent web browsers caching a user's password on the login page (note accessing this would require access to the web browser on the device where the user had logged in).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Moodle version 4.5.5 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114892">https://www.tenable.com/plugins/was/114892</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.4.x < 4.4.9 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114891</link>
            <guid>https://www.tenable.com/plugins/was/114891</guid>
            <pubDate>Tue, 24 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114891 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.4.x < 4.4.9 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.1.x prior to 4.1.19, or 4.4.x prior to 4.4.9, or 4.5.x prior to 4.5.5, or 5.x prior to 5.0.1. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span>- A stricter capability check was required to restrict which users can fetch other users' recently accessed courses information.<br /></span><span><br /></span><span>- Insufficient authorisation checks could result in users being able to view BigBlueButton recordings they did not have permission to access.<br /></span><span><br /></span><span>- The "move up" and "move down" actions in backpack management for badges did not include the necessary token to prevent a CSRF risk.<br /></span><span><br /></span><span>- Insufficient state and capability checks resulted in some details of hidden courses (such as course name, description and teachers) being available to users who did not have permission to access them.<br /></span><span><br /></span><span>- A DNS rebind risk in the way cURL requests were handled could result in an SSRF risk, due to the possibility of cURL blocked hosts / allowed ports site configurations being bypassed.<br /></span><span><br /></span><span>- The upstream ADOdb library contained an SQL injection risk in the pg_insert_id() method. It is important to note that the core Moodle LMS was NOT affected by this vulnerability, however as a precaution, this library has been upgraded to remove the risk entirely, in case any third party code/plugins uses the vulnerable code.<br /></span><span><br /></span><span>- Additional cache controls were required to prevent web browsers caching a user's password on the login page (note accessing this would require access to the web browser on the device where the user had logged in).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Moodle version 4.4.9 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114891">https://www.tenable.com/plugins/was/114891</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.1.x < 4.1.19 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114890</link>
            <guid>https://www.tenable.com/plugins/was/114890</guid>
            <pubDate>Tue, 24 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114890 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.1.x < 4.1.19 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.1.x prior to 4.1.19, or 4.4.x prior to 4.4.9, or 4.5.x prior to 4.5.5, or 5.x prior to 5.0.1. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span>- A stricter capability check was required to restrict which users can fetch other users' recently accessed courses information.<br /></span><span><br /></span><span>- Insufficient authorisation checks could result in users being able to view BigBlueButton recordings they did not have permission to access.<br /></span><span><br /></span><span>- The "move up" and "move down" actions in backpack management for badges did not include the necessary token to prevent a CSRF risk.<br /></span><span><br /></span><span>- Insufficient state and capability checks resulted in some details of hidden courses (such as course name, description and teachers) being available to users who did not have permission to access them.<br /></span><span><br /></span><span>- A DNS rebind risk in the way cURL requests were handled could result in an SSRF risk, due to the possibility of cURL blocked hosts / allowed ports site configurations being bypassed.<br /></span><span><br /></span><span>- The upstream ADOdb library contained an SQL injection risk in the pg_insert_id() method. It is important to note that the core Moodle LMS was NOT affected by this vulnerability, however as a precaution, this library has been upgraded to remove the risk entirely, in case any third party code/plugins uses the vulnerable code.<br /></span><span><br /></span><span>- Additional cache controls were required to prevent web browsers caching a user's password on the login page (note accessing this would require access to the web browser on the device where the user had logged in).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Moodle version 4.1.19 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114890">https://www.tenable.com/plugins/was/114890</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Sitecore XM/XP/XC Hardcoded Credentials]]></title>
            <link>https://www.tenable.com/plugins/was/114889</link>
            <guid>https://www.tenable.com/plugins/was/114889</guid>
            <pubDate>Tue, 24 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114889 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Sitecore XM/XP/XC Hardcoded Credentials<br /></span>
      <h3>Description</h3>
      <span>Sitecore XM, XP and XC version 9.x <= 9.3 or version 10.x < 10.4.1 rev. 011941 PRE contain a hardcoded user account. Unauthenticated and remote attackers can use this account to access administrative API over HTTP.<br /></span>
      <h3>Solution</h3>
      <span>Update at least to Sitecore XM/XP/XC version 10.4.1 rev. 011941 PRE.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114889">https://www.tenable.com/plugins/was/114889</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 9.0.0-M1 < 9.0.106 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114888</link>
            <guid>https://www.tenable.com/plugins/was/114888</guid>
            <pubDate>Fri, 20 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114888 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 9.0.0-M1 < 9.0.106 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.106, 10.1.0-M1 prior to 10.1.42 or 11.0.0-M1 prior to 11.0.8. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A race condition on connection close could trigger a JVM crash when using the APR/Native connector leading to a DoS. (CVE-2025-55668)<br /></span><span><br /></span><span> - When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed. (CVE-2025-49125)<br /></span><span><br /></span><span> - During installation, the Tomcat installer for Windows used icacls.exe without specifying a full path. This enabled a side-loading vulnerability. (CVE-2025-49124)<br /></span><span><br /></span><span> - Tomcat used the same limit for both request parameters and parts in a multipart request. Since uploaded parts also include headers which must be retained, processing multipart requests can result in significantly more memory usage. A specially crafted request that used a large number of parts could trigger excessive memory usage leading to a DoS. (CVE-2025-48988)<br /></span><span><br /></span><span> - Apache Commons FileUpload provided a hard-coded limit of 10kB for the size of the headers associated with a multipart request. A specially crafted request that used a large number of parts with large headers could trigger excessive memory usage leading to a DoS. (CVE-2025-48976)<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.106 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114888">https://www.tenable.com/plugins/was/114888</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 10.1.0-M1 < 10.1.42 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114887</link>
            <guid>https://www.tenable.com/plugins/was/114887</guid>
            <pubDate>Fri, 20 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114887 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 10.1.0-M1 < 10.1.42 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.106, 10.1.0-M1 prior to 10.1.42 or 11.0.0-M1 prior to 11.0.8. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A race condition on connection close could trigger a JVM crash when using the APR/Native connector leading to a DoS. (CVE-2025-55668)<br /></span><span><br /></span><span> - When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed. (CVE-2025-49125)<br /></span><span><br /></span><span> - During installation, the Tomcat installer for Windows used icacls.exe without specifying a full path. This enabled a side-loading vulnerability. (CVE-2025-49124)<br /></span><span><br /></span><span> - Tomcat used the same limit for both request parameters and parts in a multipart request. Since uploaded parts also include headers which must be retained, processing multipart requests can result in significantly more memory usage. A specially crafted request that used a large number of parts could trigger excessive memory usage leading to a DoS. (CVE-2025-48988)<br /></span><span><br /></span><span> - Apache Commons FileUpload provided a hard-coded limit of 10kB for the size of the headers associated with a multipart request. A specially crafted request that used a large number of parts with large headers could trigger excessive memory usage leading to a DoS. (CVE-2025-48976)<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.42 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114887">https://www.tenable.com/plugins/was/114887</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 11.0.0-M1 < 11.0.8 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114886</link>
            <guid>https://www.tenable.com/plugins/was/114886</guid>
            <pubDate>Fri, 20 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114886 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 11.0.0-M1 < 11.0.8 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.106, 10.1.0-M1 prior to 10.1.42 or 11.0.0-M1 prior to 11.0.8. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A race condition on connection close could trigger a JVM crash when using the APR/Native connector leading to a DoS. (CVE-2025-55668)<br /></span><span><br /></span><span> - When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed. (CVE-2025-49125)<br /></span><span><br /></span><span> - During installation, the Tomcat installer for Windows used icacls.exe without specifying a full path. This enabled a side-loading vulnerability. (CVE-2025-49124)<br /></span><span><br /></span><span> - Tomcat used the same limit for both request parameters and parts in a multipart request. Since uploaded parts also include headers which must be retained, processing multipart requests can result in significantly more memory usage. A specially crafted request that used a large number of parts could trigger excessive memory usage leading to a DoS. (CVE-2025-48988)<br /></span><span><br /></span><span> - Apache Commons FileUpload provided a hard-coded limit of 10kB for the size of the headers associated with a multipart request. A specially crafted request that used a large number of parts with large headers could trigger excessive memory usage leading to a DoS. (CVE-2025-48976)<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 11.0.8 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114886">https://www.tenable.com/plugins/was/114886</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MCP Server SSE DNS Rebinding]]></title>
            <link>https://www.tenable.com/plugins/was/114885</link>
            <guid>https://www.tenable.com/plugins/was/114885</guid>
            <pubDate>Fri, 20 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114885 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>MCP Server SSE DNS Rebinding<br /></span>
      <h3>Description</h3>
      <span>ModelContextProtocol (MCP) servers using SSE (Server-Sent Events) transport mode are prone to DNS rebinding attacks when they do not enforce strict verification of both the 'Origin' and 'Host' headers. This vulnerability allows an attacker to bypass same-origin policies, potentially leading to unauthorized access to sensitive data or actions on behalf of the user in the context of the vulnerable MCP server.<br /></span><span><br /></span><span>This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the MCP server enforces both the 'Origin' and the 'Host' header validation to prevent DNS rebinding attacks. This can be achieved by implementing strict validation rules for incoming requests, ensuring that the 'Host' header matches the expected domain and that the 'Origin' header is from a trusted source.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114885">https://www.tenable.com/plugins/was/114885</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FastJSON Object Deserialization]]></title>
            <link>https://www.tenable.com/plugins/was/114884</link>
            <guid>https://www.tenable.com/plugins/was/114884</guid>
            <pubDate>Tue, 17 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114884 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>FastJSON Object Deserialization<br /></span>
      <h3>Description</h3>
      <span>Serialization is the process of converting an object to a stream of bytes, in order to store or send it through the network. By opposition, deserialization is the process of reconstructing an object from this stream of bytes.<br /></span><span><br /></span><span>When an application using the FastJSON library performs untrusted data deserialization, an attacker could inject a custom serialized JSON object to trigger malicious code execution on the system or to generate a Denial of Service attack (DoS).<br /></span><span><br /></span><span>It was determined that the target Java application using FastJSON is vulnerable to this attack as it deserializes a user-supplied object.<br /></span>
      <h3>Solution</h3>
      <span>Untrusted data should never be deserialized by the application. If required, a code review should be done to prevent deserialization of arbitrary classes and to harden the whole process. Ensure the FastJSON library is updated to the latest version, and consider using FastJSON's safe mode or implementing custom whitelisting/blacklisting of classes for deserialization if updating is not immediately possible.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114884">https://www.tenable.com/plugins/was/114884</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Llms.txt File Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114883</link>
            <guid>https://www.tenable.com/plugins/was/114883</guid>
            <pubDate>Wed, 11 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114883 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Llms.txt File Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected a publicly accessible 'llms.txt' file on the target application. The 'llms.txt' file is a proposal designed to provide LLM-friendly content written in markdown for LLMs usage. This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114883">https://www.tenable.com/plugins/was/114883</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[GraphQL Unauthenticated Mutation Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114882</link>
            <guid>https://www.tenable.com/plugins/was/114882</guid>
            <pubDate>Wed, 11 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114882 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>GraphQL Unauthenticated Mutation Detected<br /></span>
      <h3>Description</h3>
      <span>GraphQL is an open-source query and manipulation language for APIs. Unlike regular queries that only read data, mutations are operations designed to modify data on the server. When GraphQL APIs allow mutation operations without requiring proper authentication, attackers can manipulate, insert, update, or delete data without authorization.<br /></span>
      <h3>Solution</h3>
      <span>Implement proper authentication and authorization controls on all GraphQL endpoints, especially for mutation operations.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114882">https://www.tenable.com/plugins/was/114882</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MCP Server Unauthenticated Access]]></title>
            <link>https://www.tenable.com/plugins/was/114791</link>
            <guid>https://www.tenable.com/plugins/was/114791</guid>
            <pubDate>Wed, 11 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114791 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>MCP Server Unauthenticated Access<br /></span>
      <h3>Description</h3>
      <span>This is an informational notice that the scanner was able to detect a Model Context Protocol (MCP) server available without authentication on the target server. When available, the plugin provides the list of tools, prompts and resources in the attachments.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the unauthenticated access avability to this MCP server is expected and does not expose sensitive information.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114791">https://www.tenable.com/plugins/was/114791</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Drift Chatbot Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114881</link>
            <guid>https://www.tenable.com/plugins/was/114881</guid>
            <pubDate>Fri, 06 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114881 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Drift Chatbot Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected a publicly accessible Drift chatbot on the target application. Drift is a solution to build & deploy AI customer experiences. This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114881">https://www.tenable.com/plugins/was/114881</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Intercom Chatbot Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114880</link>
            <guid>https://www.tenable.com/plugins/was/114880</guid>
            <pubDate>Fri, 06 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114880 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Intercom Chatbot Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected a publicly accessible Intercom chatbot on the target application. Intercom is a solution to build & deploy AI customer experiences. This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114880">https://www.tenable.com/plugins/was/114880</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Livechat Chatbot Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114879</link>
            <guid>https://www.tenable.com/plugins/was/114879</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114879 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Livechat Chatbot Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected a publicly accessible Livechat chatbot on the target application. Livechat is a solution to build & deploy AI customer experiences. This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114879">https://www.tenable.com/plugins/was/114879</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Dialogflow Chatbot Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114878</link>
            <guid>https://www.tenable.com/plugins/was/114878</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114878 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Dialogflow Chatbot Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected a publicly accessible Dialogflow chatbot on the target application. Google Dialogflow is a natural language understanding platform to help developers building conversational user interfaces. This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114878">https://www.tenable.com/plugins/was/114878</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 9.0.0-M1 < 9.0.105 CGI Security Constraint Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114877</link>
            <guid>https://www.tenable.com/plugins/was/114877</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114877 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 9.0.0-M1 < 9.0.105 CGI Security Constraint Bypass<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.105, 10.1.0-M1 prior to 10.1.41 or 11.0.0-M1 prior to 11.0.7. It is, therefore, affected by a CGI security sonstraint bypass.<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.105 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114877">https://www.tenable.com/plugins/was/114877</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 10.1.0-M1 < 10.1.41 CGI Security Constraint Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114876</link>
            <guid>https://www.tenable.com/plugins/was/114876</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114876 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 10.1.0-M1 < 10.1.41 CGI Security Constraint Bypass<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.105, 10.1.0-M1 prior to 10.1.41 or 11.0.0-M1 prior to 11.0.7. It is, therefore, affected by a CGI security sonstraint bypass.<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.41 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114876">https://www.tenable.com/plugins/was/114876</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 11.0.0-M1 < 11.0.7 CGI Security Constraint Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114875</link>
            <guid>https://www.tenable.com/plugins/was/114875</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114875 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 11.0.0-M1 < 11.0.7 CGI Security Constraint Bypass<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.105, 10.1.0-M1 prior to 10.1.41 or 11.0.0-M1 prior to 11.0.7. It is, therefore, affected by a CGI security sonstraint bypass.<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 11.0.7 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114875">https://www.tenable.com/plugins/was/114875</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Typebot Chatbot Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114874</link>
            <guid>https://www.tenable.com/plugins/was/114874</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114874 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Typebot Chatbot Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected a publicly accessible Typebot chatbot on the target application. Typebot is an open-source chatbot builder. This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114874">https://www.tenable.com/plugins/was/114874</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Azure Bot Framework Chatbot Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114873</link>
            <guid>https://www.tenable.com/plugins/was/114873</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114873 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Azure Bot Framework Chatbot Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected a publicly accessible Azure Bot Framework chatbot on the target application. Azure Bot Framework is a solution to build & deploy AI customer experiences. This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114873">https://www.tenable.com/plugins/was/114873</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Voiceflow Chatbot Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114872</link>
            <guid>https://www.tenable.com/plugins/was/114872</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114872 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Voiceflow Chatbot Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected a publicly accessible Voiceflow chatbot on the target application. Voiceflow is a solution to build & deploy AI customer experiences. This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114872">https://www.tenable.com/plugins/was/114872</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Botpress Chatbot Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114871</link>
            <guid>https://www.tenable.com/plugins/was/114871</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114871 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Botpress Chatbot Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected a publicly accessible Botpress chatbot on the target application. Botpress is an open-source visual framework to build & deploy GPT/LLM Agents. This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114871">https://www.tenable.com/plugins/was/114871</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Langflow Chatbot Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114870</link>
            <guid>https://www.tenable.com/plugins/was/114870</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114870 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Langflow Chatbot Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected a publicly accessible Langflow chatbot on the target application. Langflow is an open-source visual framework for building multi-agent and RAG. This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114870">https://www.tenable.com/plugins/was/114870</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[vBulletin 5.0.x < 6.0.4 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114869</link>
            <guid>https://www.tenable.com/plugins/was/114869</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114869 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>vBulletin 5.0.x < 6.0.4 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>vBulletin versions 5.0.x prior to 6.0.4 are vulnerable to an improper authentication allowing unauthenticated users to invoke protected API controllers' methods when running on PHP 8.1 or later. This vulnerability can lead to remote code execution (RCE).<br /></span><span><br /></span><span>Note that this plugin requires the 'File Upload' assessment option enabled in the scan configuration.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to vBulletin version 6.0.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114869">https://www.tenable.com/plugins/was/114869</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[GraphQL Alias Overloading Enabled]]></title>
            <link>https://www.tenable.com/plugins/was/114868</link>
            <guid>https://www.tenable.com/plugins/was/114868</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114868 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>GraphQL Alias Overloading Enabled<br /></span>
      <h3>Description</h3>
      <span>GraphQL is an open-source query and manipulation language for APIs. GraphQL alias overloading is a vulnerability where an attacker sends queries with numerous aliased fields to cause server performance degradation. The server must process each alias separately, which can lead to excessive CPU usage, memory consumption, and potentially denial of service.<br /></span>
      <h3>Solution</h3>
      <span>Implement query complexity analysis that sets limits on the maximum number of aliases allowed per query and rejects requests exceeding predefined thresholds.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114868">https://www.tenable.com/plugins/was/114868</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[GraphQL Query Length Not Limited]]></title>
            <link>https://www.tenable.com/plugins/was/114867</link>
            <guid>https://www.tenable.com/plugins/was/114867</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114867 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>GraphQL Query Length Not Limited<br /></span>
      <h3>Description</h3>
      <span>GraphQL is an open-source query and manipulation language for APIs. When a GraphQL API does not enforce limits on query length or complexity, attackers can submit extremely large and complex queries that consume excessive server resources, potentially causing denial of service conditions.<br /></span>
      <h3>Solution</h3>
      <span>Implement query length limitations, depth restrictions, and complexity analysis on all GraphQL endpoints to prevent resource exhaustion attacks.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114867">https://www.tenable.com/plugins/was/114867</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[GraphQL Debug Mode Enabled]]></title>
            <link>https://www.tenable.com/plugins/was/114866</link>
            <guid>https://www.tenable.com/plugins/was/114866</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114866 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>GraphQL Debug Mode Enabled<br /></span>
      <h3>Description</h3>
      <span>GraphQL is an open-source query and manipulation language for APIs. When GraphQL is run in a 'debug mode' it can leak information about the underlying web applications.<br /></span>
      <h3>Solution</h3>
      <span>Disable the GraphQL debug mode.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114866">https://www.tenable.com/plugins/was/114866</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 9.3.x < 9.3.4 Cross-site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114865</link>
            <guid>https://www.tenable.com/plugins/was/114865</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114865 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 9.3.x < 9.3.4 Cross-site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 9.2.10, or 9.3.x earlier than 9.3.4. It is, therefore, affected by a cross-site scripting vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 9.3.4 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114865">https://www.tenable.com/plugins/was/114865</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana < 9.2.10 Cross-site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114864</link>
            <guid>https://www.tenable.com/plugins/was/114864</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114864 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana < 9.2.10 Cross-site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 9.2.10, or 9.3.x earlier than 9.3.4. It is, therefore, affected by a cross-site scripting vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 9.2.10 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114864">https://www.tenable.com/plugins/was/114864</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 9.3.x < 9.3.8 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114863</link>
            <guid>https://www.tenable.com/plugins/was/114863</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114863 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 9.3.x < 9.3.8 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 8.5.x earlier than 8.5.21, or 9.2.x earlier than 9.2.13, or 9.3.x earlier than 9.3.8. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- A Cross-site Scripting vulnerability.<br /></span><span><br /></span><span>- A Cross-site Scripting vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 9.3.8 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114863">https://www.tenable.com/plugins/was/114863</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 9.2.x < 9.2.13 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114862</link>
            <guid>https://www.tenable.com/plugins/was/114862</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114862 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 9.2.x < 9.2.13 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 8.5.x earlier than 8.5.21, or 9.2.x earlier than 9.2.13, or 9.3.x earlier than 9.3.8. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- A Cross-site Scripting vulnerability.<br /></span><span><br /></span><span>- A Cross-site Scripting vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 9.2.13 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114862">https://www.tenable.com/plugins/was/114862</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 8.5.x < 8.5.21 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114861</link>
            <guid>https://www.tenable.com/plugins/was/114861</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114861 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 8.5.x < 8.5.21 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 8.5.x earlier than 8.5.21, or 9.2.x earlier than 9.2.13, or 9.3.x earlier than 9.3.8. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- A Cross-site Scripting vulnerability.<br /></span><span><br /></span><span>- A Cross-site Scripting vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 8.5.21 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114861">https://www.tenable.com/plugins/was/114861</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana < 9.3.11 Cross-site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114860</link>
            <guid>https://www.tenable.com/plugins/was/114860</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114860 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana < 9.3.11 Cross-site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 8.5.22, or earlier than 9.2.15, or earlier than 9.3.11. It is, therefore, affected by a cross-site scripting vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 9.3.11 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114860">https://www.tenable.com/plugins/was/114860</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana < 9.2.15 Cross-site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114859</link>
            <guid>https://www.tenable.com/plugins/was/114859</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114859 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana < 9.2.15 Cross-site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 8.5.22, or earlier than 9.2.15, or earlier than 9.3.11. It is, therefore, affected by a cross-site scripting vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 9.2.15 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114859">https://www.tenable.com/plugins/was/114859</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana < 8.5.22 Cross-site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114858</link>
            <guid>https://www.tenable.com/plugins/was/114858</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114858 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana < 8.5.22 Cross-site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 8.5.22, or earlier than 9.2.15, or earlier than 9.3.11. It is, therefore, affected by a cross-site scripting vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 8.5.22 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114858">https://www.tenable.com/plugins/was/114858</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 9.4.x < 9.4.9 Exposure Of Sensitive Information To An Unauthorized Actor]]></title>
            <link>https://www.tenable.com/plugins/was/114857</link>
            <guid>https://www.tenable.com/plugins/was/114857</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114857 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 9.4.x < 9.4.9 Exposure Of Sensitive Information To An Unauthorized Actor<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 9.2.x earlier than 9.2.17, or 9.3.x earlier than 9.3.13, or 9.4.x earlier than 9.4.9. It is, therefore, affected by a exposure of sensitive information to an unauthorized actor vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 9.4.9 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114857">https://www.tenable.com/plugins/was/114857</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 9.3.x < 9.3.13 Exposure Of Sensitive Information To An Unauthorized Actor]]></title>
            <link>https://www.tenable.com/plugins/was/114856</link>
            <guid>https://www.tenable.com/plugins/was/114856</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114856 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 9.3.x < 9.3.13 Exposure Of Sensitive Information To An Unauthorized Actor<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 9.2.x earlier than 9.2.17, or 9.3.x earlier than 9.3.13, or 9.4.x earlier than 9.4.9. It is, therefore, affected by a exposure of sensitive information to an unauthorized actor vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 9.3.13 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114856">https://www.tenable.com/plugins/was/114856</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 9.2.x < 9.2.17 Exposure Of Sensitive Information To An Unauthorized Actor]]></title>
            <link>https://www.tenable.com/plugins/was/114855</link>
            <guid>https://www.tenable.com/plugins/was/114855</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114855 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 9.2.x < 9.2.17 Exposure Of Sensitive Information To An Unauthorized Actor<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 9.2.x earlier than 9.2.17, or 9.3.x earlier than 9.3.13, or 9.4.x earlier than 9.4.9. It is, therefore, affected by a exposure of sensitive information to an unauthorized actor vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 9.2.17 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114855">https://www.tenable.com/plugins/was/114855</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 9.5.x < 9.5.3 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114854</link>
            <guid>https://www.tenable.com/plugins/was/114854</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114854 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 9.5.x < 9.5.3 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 8.5.26, or earlier than 9.2.19, or earlier than 9.3.15, or earlier than 9.4.12, or 9.5.x earlier than 9.5.3. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- A Missing Authorization vulnerability.<br /></span><span><br /></span><span>- A Missing Synchronization vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 9.5.3 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114854">https://www.tenable.com/plugins/was/114854</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana < 9.4.12 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114853</link>
            <guid>https://www.tenable.com/plugins/was/114853</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114853 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana < 9.4.12 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 8.5.26, or earlier than 9.2.19, or earlier than 9.3.15, or earlier than 9.4.12, or 9.5.x earlier than 9.5.3. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- A Missing Authorization vulnerability.<br /></span><span><br /></span><span>- A Missing Synchronization vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 9.4.12 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114853">https://www.tenable.com/plugins/was/114853</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana < 9.3.15 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114852</link>
            <guid>https://www.tenable.com/plugins/was/114852</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114852 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana < 9.3.15 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 8.5.26, or earlier than 9.2.19, or earlier than 9.3.15, or earlier than 9.4.12, or 9.5.x earlier than 9.5.3. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- A Missing Authorization vulnerability.<br /></span><span><br /></span><span>- A Missing Synchronization vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 9.3.15 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114852">https://www.tenable.com/plugins/was/114852</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana < 9.2.19 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114851</link>
            <guid>https://www.tenable.com/plugins/was/114851</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114851 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana < 9.2.19 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 8.5.26, or earlier than 9.2.19, or earlier than 9.3.15, or earlier than 9.4.12, or 9.5.x earlier than 9.5.3. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- A Missing Authorization vulnerability.<br /></span><span><br /></span><span>- A Missing Synchronization vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 9.2.19 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114851">https://www.tenable.com/plugins/was/114851</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana < 8.5.26 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114850</link>
            <guid>https://www.tenable.com/plugins/was/114850</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114850 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana < 8.5.26 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 8.5.26, or earlier than 9.2.19, or earlier than 9.3.15, or earlier than 9.4.12, or 9.5.x earlier than 9.5.3. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- A Missing Authorization vulnerability.<br /></span><span><br /></span><span>- A Missing Synchronization vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 8.5.26 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114850">https://www.tenable.com/plugins/was/114850</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 10.3.x < 10.3.3 Incorrect Authorization]]></title>
            <link>https://www.tenable.com/plugins/was/114849</link>
            <guid>https://www.tenable.com/plugins/was/114849</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114849 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 10.3.x < 10.3.3 Incorrect Authorization<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 9.5.x earlier than 9.5.16, or 10.0.x earlier than 10.0.11, or 10.1.x earlier than 10.1.7, or 10.2.x earlier than 10.2.4, or 10.3.x earlier than 10.3.3. It is, therefore, affected by a incorrect authorization vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 10.3.3 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114849">https://www.tenable.com/plugins/was/114849</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 10.2.x < 10.2.4 Incorrect Authorization]]></title>
            <link>https://www.tenable.com/plugins/was/114848</link>
            <guid>https://www.tenable.com/plugins/was/114848</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114848 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 10.2.x < 10.2.4 Incorrect Authorization<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 9.5.x earlier than 9.5.16, or 10.0.x earlier than 10.0.11, or 10.1.x earlier than 10.1.7, or 10.2.x earlier than 10.2.4, or 10.3.x earlier than 10.3.3. It is, therefore, affected by a incorrect authorization vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 10.2.4 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114848">https://www.tenable.com/plugins/was/114848</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 10.1.x < 10.1.7 Incorrect Authorization]]></title>
            <link>https://www.tenable.com/plugins/was/114847</link>
            <guid>https://www.tenable.com/plugins/was/114847</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114847 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 10.1.x < 10.1.7 Incorrect Authorization<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 9.5.x earlier than 9.5.16, or 10.0.x earlier than 10.0.11, or 10.1.x earlier than 10.1.7, or 10.2.x earlier than 10.2.4, or 10.3.x earlier than 10.3.3. It is, therefore, affected by a incorrect authorization vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 10.1.7 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114847">https://www.tenable.com/plugins/was/114847</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 10.0.x < 10.0.11 Incorrect Authorization]]></title>
            <link>https://www.tenable.com/plugins/was/114846</link>
            <guid>https://www.tenable.com/plugins/was/114846</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114846 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 10.0.x < 10.0.11 Incorrect Authorization<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 9.5.x earlier than 9.5.16, or 10.0.x earlier than 10.0.11, or 10.1.x earlier than 10.1.7, or 10.2.x earlier than 10.2.4, or 10.3.x earlier than 10.3.3. It is, therefore, affected by a incorrect authorization vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 10.0.11 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114846">https://www.tenable.com/plugins/was/114846</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 9.5.x < 9.5.16 Incorrect Authorization]]></title>
            <link>https://www.tenable.com/plugins/was/114845</link>
            <guid>https://www.tenable.com/plugins/was/114845</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114845 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 9.5.x < 9.5.16 Incorrect Authorization<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 9.5.x earlier than 9.5.16, or 10.0.x earlier than 10.0.11, or 10.1.x earlier than 10.1.7, or 10.2.x earlier than 10.2.4, or 10.3.x earlier than 10.3.3. It is, therefore, affected by a incorrect authorization vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 9.5.16 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114845">https://www.tenable.com/plugins/was/114845</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 10.3.x < 10.3.4 Improper Privilege Management]]></title>
            <link>https://www.tenable.com/plugins/was/114844</link>
            <guid>https://www.tenable.com/plugins/was/114844</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114844 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 10.3.x < 10.3.4 Improper Privilege Management<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 8.5.x earlier than 9.5.7, or 10.0.x earlier than 10.0.12, or 10.1.x earlier than 10.1.8, or 10.2.x earlier than 10.2.5, or 10.3.x earlier than 10.3.4. It is, therefore, affected by a improper privilege management vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 10.3.4 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114844">https://www.tenable.com/plugins/was/114844</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 10.2.x < 10.2.5 Improper Privilege Management]]></title>
            <link>https://www.tenable.com/plugins/was/114843</link>
            <guid>https://www.tenable.com/plugins/was/114843</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114843 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 10.2.x < 10.2.5 Improper Privilege Management<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 8.5.x earlier than 9.5.7, or 10.0.x earlier than 10.0.12, or 10.1.x earlier than 10.1.8, or 10.2.x earlier than 10.2.5, or 10.3.x earlier than 10.3.4. It is, therefore, affected by a improper privilege management vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 10.2.5 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114843">https://www.tenable.com/plugins/was/114843</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 10.1.x < 10.1.8 Improper Privilege Management]]></title>
            <link>https://www.tenable.com/plugins/was/114842</link>
            <guid>https://www.tenable.com/plugins/was/114842</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114842 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 10.1.x < 10.1.8 Improper Privilege Management<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 8.5.x earlier than 9.5.7, or 10.0.x earlier than 10.0.12, or 10.1.x earlier than 10.1.8, or 10.2.x earlier than 10.2.5, or 10.3.x earlier than 10.3.4. It is, therefore, affected by a improper privilege management vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 10.1.8 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114842">https://www.tenable.com/plugins/was/114842</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 10.0.x < 10.0.12 Improper Privilege Management]]></title>
            <link>https://www.tenable.com/plugins/was/114841</link>
            <guid>https://www.tenable.com/plugins/was/114841</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114841 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 10.0.x < 10.0.12 Improper Privilege Management<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 8.5.x earlier than 9.5.7, or 10.0.x earlier than 10.0.12, or 10.1.x earlier than 10.1.8, or 10.2.x earlier than 10.2.5, or 10.3.x earlier than 10.3.4. It is, therefore, affected by a improper privilege management vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 10.0.12 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114841">https://www.tenable.com/plugins/was/114841</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 8.5.x < 9.5.7 Improper Privilege Management]]></title>
            <link>https://www.tenable.com/plugins/was/114840</link>
            <guid>https://www.tenable.com/plugins/was/114840</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114840 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 8.5.x < 9.5.7 Improper Privilege Management<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 8.5.x earlier than 9.5.7, or 10.0.x earlier than 10.0.12, or 10.1.x earlier than 10.1.8, or 10.2.x earlier than 10.2.5, or 10.3.x earlier than 10.3.4. It is, therefore, affected by a improper privilege management vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 9.5.7 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114840">https://www.tenable.com/plugins/was/114840</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 10.3.x < 10.3.5 Authorization Bypass Through User-controlled Key]]></title>
            <link>https://www.tenable.com/plugins/was/114839</link>
            <guid>https://www.tenable.com/plugins/was/114839</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114839 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 10.3.x < 10.3.5 Authorization Bypass Through User-controlled Key<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 9.5.x earlier than 9.5.18, or 10.0.x earlier than 10.0.13, or 10.1.x earlier than 10.1.9, or 10.2.x earlier than 10.2.6, or 10.3.x earlier than 10.3.5. It is, therefore, affected by a authorization bypass through user-controlled key vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 10.3.5 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114839">https://www.tenable.com/plugins/was/114839</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 10.2.x < 10.2.6 Authorization Bypass Through User-controlled Key]]></title>
            <link>https://www.tenable.com/plugins/was/114838</link>
            <guid>https://www.tenable.com/plugins/was/114838</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114838 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 10.2.x < 10.2.6 Authorization Bypass Through User-controlled Key<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 9.5.x earlier than 9.5.18, or 10.0.x earlier than 10.0.13, or 10.1.x earlier than 10.1.9, or 10.2.x earlier than 10.2.6, or 10.3.x earlier than 10.3.5. It is, therefore, affected by a authorization bypass through user-controlled key vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 10.2.6 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114838">https://www.tenable.com/plugins/was/114838</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 10.1.x < 10.1.9 Authorization Bypass Through User-controlled Key]]></title>
            <link>https://www.tenable.com/plugins/was/114837</link>
            <guid>https://www.tenable.com/plugins/was/114837</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114837 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 10.1.x < 10.1.9 Authorization Bypass Through User-controlled Key<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 9.5.x earlier than 9.5.18, or 10.0.x earlier than 10.0.13, or 10.1.x earlier than 10.1.9, or 10.2.x earlier than 10.2.6, or 10.3.x earlier than 10.3.5. It is, therefore, affected by a authorization bypass through user-controlled key vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 10.1.9 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114837">https://www.tenable.com/plugins/was/114837</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 10.0.x < 10.0.13 Authorization Bypass Through User-controlled Key]]></title>
            <link>https://www.tenable.com/plugins/was/114836</link>
            <guid>https://www.tenable.com/plugins/was/114836</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114836 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 10.0.x < 10.0.13 Authorization Bypass Through User-controlled Key<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 9.5.x earlier than 9.5.18, or 10.0.x earlier than 10.0.13, or 10.1.x earlier than 10.1.9, or 10.2.x earlier than 10.2.6, or 10.3.x earlier than 10.3.5. It is, therefore, affected by a authorization bypass through user-controlled key vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 10.0.13 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114836">https://www.tenable.com/plugins/was/114836</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 9.5.x < 9.5.18 Authorization Bypass Through User-controlled Key]]></title>
            <link>https://www.tenable.com/plugins/was/114835</link>
            <guid>https://www.tenable.com/plugins/was/114835</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114835 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 9.5.x < 9.5.18 Authorization Bypass Through User-controlled Key<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 9.5.x earlier than 9.5.18, or 10.0.x earlier than 10.0.13, or 10.1.x earlier than 10.1.9, or 10.2.x earlier than 10.2.6, or 10.3.x earlier than 10.3.5. It is, therefore, affected by a authorization bypass through user-controlled key vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 9.5.18 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114835">https://www.tenable.com/plugins/was/114835</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.2.x < 11.2.1 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114834</link>
            <guid>https://www.tenable.com/plugins/was/114834</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114834 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.2.x < 11.2.1 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 10.3.x earlier than 10.3.10, or 10.4.x earlier than 10.4.9, or 11.0.x earlier than 11.0.5, or 11.1.x earlier than 11.1.6, or 11.2.x earlier than 11.2.1. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- A Code Injection vulnerability.<br /></span><span><br /></span><span>- A Improper Isolation Or Compartmentalization vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.2.1 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114834">https://www.tenable.com/plugins/was/114834</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.1.x < 11.1.6 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114833</link>
            <guid>https://www.tenable.com/plugins/was/114833</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114833 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.1.x < 11.1.6 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 10.3.x earlier than 10.3.10, or 10.4.x earlier than 10.4.9, or 11.0.x earlier than 11.0.5, or 11.1.x earlier than 11.1.6, or 11.2.x earlier than 11.2.1. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- A Code Injection vulnerability.<br /></span><span><br /></span><span>- A Improper Isolation Or Compartmentalization vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.1.6 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114833">https://www.tenable.com/plugins/was/114833</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.0.x < 11.0.5 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114832</link>
            <guid>https://www.tenable.com/plugins/was/114832</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114832 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.0.x < 11.0.5 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 10.3.x earlier than 10.3.10, or 10.4.x earlier than 10.4.9, or 11.0.x earlier than 11.0.5, or 11.1.x earlier than 11.1.6, or 11.2.x earlier than 11.2.1. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- A Code Injection vulnerability.<br /></span><span><br /></span><span>- A Improper Isolation Or Compartmentalization vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.0.5 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114832">https://www.tenable.com/plugins/was/114832</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 10.4.x < 10.4.9 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114831</link>
            <guid>https://www.tenable.com/plugins/was/114831</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114831 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 10.4.x < 10.4.9 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 10.3.x earlier than 10.3.10, or 10.4.x earlier than 10.4.9, or 11.0.x earlier than 11.0.5, or 11.1.x earlier than 11.1.6, or 11.2.x earlier than 11.2.1. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- A Code Injection vulnerability.<br /></span><span><br /></span><span>- A Improper Isolation Or Compartmentalization vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 10.4.9 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114831">https://www.tenable.com/plugins/was/114831</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 10.3.x < 10.3.10 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114830</link>
            <guid>https://www.tenable.com/plugins/was/114830</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114830 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 10.3.x < 10.3.10 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 10.3.x earlier than 10.3.10, or 10.4.x earlier than 10.4.9, or 11.0.x earlier than 11.0.5, or 11.1.x earlier than 11.1.6, or 11.2.x earlier than 11.2.1. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- A Code Injection vulnerability.<br /></span><span><br /></span><span>- A Improper Isolation Or Compartmentalization vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 10.3.10 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114830">https://www.tenable.com/plugins/was/114830</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.3.x < 11.3.0+security-01 Incorrect Privilege Assignment]]></title>
            <link>https://www.tenable.com/plugins/was/114829</link>
            <guid>https://www.tenable.com/plugins/was/114829</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114829 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.3.x < 11.3.0+security-01 Incorrect Privilege Assignment<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 11.2.x earlier than 11.2.3+security-01, or 11.3.x earlier than 11.3.0+security-01. It is, therefore, affected by a incorrect privilege assignment vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.3.0+security-01 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114829">https://www.tenable.com/plugins/was/114829</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.2.x < 11.2.3+security-01 Incorrect Privilege Assignment]]></title>
            <link>https://www.tenable.com/plugins/was/114828</link>
            <guid>https://www.tenable.com/plugins/was/114828</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114828 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.2.x < 11.2.3+security-01 Incorrect Privilege Assignment<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 11.2.x earlier than 11.2.3+security-01, or 11.3.x earlier than 11.3.0+security-01. It is, therefore, affected by a incorrect privilege assignment vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.2.3+security-01 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114828">https://www.tenable.com/plugins/was/114828</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana < 11.4.1 Exposure Of Sensitive Information To An Unauthorized Actor]]></title>
            <link>https://www.tenable.com/plugins/was/114827</link>
            <guid>https://www.tenable.com/plugins/was/114827</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114827 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana < 11.4.1 Exposure Of Sensitive Information To An Unauthorized Actor<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 10.4.15, or earlier than 11.0.11, or earlier than 11.1.11, or earlier than 11.2.6, or earlier than 11.3.3, or earlier than 11.4.1. It is, therefore, affected by a exposure of sensitive information to an unauthorized actor vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.4.1 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114827">https://www.tenable.com/plugins/was/114827</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana < 11.3.3 Exposure Of Sensitive Information To An Unauthorized Actor]]></title>
            <link>https://www.tenable.com/plugins/was/114826</link>
            <guid>https://www.tenable.com/plugins/was/114826</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114826 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana < 11.3.3 Exposure Of Sensitive Information To An Unauthorized Actor<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 10.4.15, or earlier than 11.0.11, or earlier than 11.1.11, or earlier than 11.2.6, or earlier than 11.3.3, or earlier than 11.4.1. It is, therefore, affected by a exposure of sensitive information to an unauthorized actor vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.3.3 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114826">https://www.tenable.com/plugins/was/114826</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana < 11.2.6 Exposure Of Sensitive Information To An Unauthorized Actor]]></title>
            <link>https://www.tenable.com/plugins/was/114825</link>
            <guid>https://www.tenable.com/plugins/was/114825</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114825 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana < 11.2.6 Exposure Of Sensitive Information To An Unauthorized Actor<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 10.4.15, or earlier than 11.0.11, or earlier than 11.1.11, or earlier than 11.2.6, or earlier than 11.3.3, or earlier than 11.4.1. It is, therefore, affected by a exposure of sensitive information to an unauthorized actor vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.2.6 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114825">https://www.tenable.com/plugins/was/114825</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana < 11.1.11 Exposure Of Sensitive Information To An Unauthorized Actor]]></title>
            <link>https://www.tenable.com/plugins/was/114824</link>
            <guid>https://www.tenable.com/plugins/was/114824</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114824 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana < 11.1.11 Exposure Of Sensitive Information To An Unauthorized Actor<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 10.4.15, or earlier than 11.0.11, or earlier than 11.1.11, or earlier than 11.2.6, or earlier than 11.3.3, or earlier than 11.4.1. It is, therefore, affected by a exposure of sensitive information to an unauthorized actor vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.1.11 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114824">https://www.tenable.com/plugins/was/114824</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana < 11.0.11 Exposure Of Sensitive Information To An Unauthorized Actor]]></title>
            <link>https://www.tenable.com/plugins/was/114823</link>
            <guid>https://www.tenable.com/plugins/was/114823</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114823 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana < 11.0.11 Exposure Of Sensitive Information To An Unauthorized Actor<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 10.4.15, or earlier than 11.0.11, or earlier than 11.1.11, or earlier than 11.2.6, or earlier than 11.3.3, or earlier than 11.4.1. It is, therefore, affected by a exposure of sensitive information to an unauthorized actor vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.0.11 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114823">https://www.tenable.com/plugins/was/114823</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana < 10.4.15 Exposure Of Sensitive Information To An Unauthorized Actor]]></title>
            <link>https://www.tenable.com/plugins/was/114822</link>
            <guid>https://www.tenable.com/plugins/was/114822</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114822 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana < 10.4.15 Exposure Of Sensitive Information To An Unauthorized Actor<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 10.4.15, or earlier than 11.0.11, or earlier than 11.1.11, or earlier than 11.2.6, or earlier than 11.3.3, or earlier than 11.4.1. It is, therefore, affected by a exposure of sensitive information to an unauthorized actor vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 10.4.15 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114822">https://www.tenable.com/plugins/was/114822</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.1.x < 11.6.0+security-01 Cross-site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114821</link>
            <guid>https://www.tenable.com/plugins/was/114821</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114821 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.1.x < 11.6.0+security-01 Cross-site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 11.1.x earlier than 11.2.8+security-01, or 11.1.x earlier than 11.3.5+security-01, or 11.1.x earlier than 11.4.3+security-01, or 11.1.x earlier than 11.5.3+security-01, or 11.1.x earlier than 11.6.0+security-01. It is, therefore, affected by a cross-site scripting vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.6.0+security-01 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114821">https://www.tenable.com/plugins/was/114821</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.1.x < 11.5.3+security-01 Cross-site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114820</link>
            <guid>https://www.tenable.com/plugins/was/114820</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114820 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.1.x < 11.5.3+security-01 Cross-site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 11.1.x earlier than 11.2.8+security-01, or 11.1.x earlier than 11.3.5+security-01, or 11.1.x earlier than 11.4.3+security-01, or 11.1.x earlier than 11.5.3+security-01, or 11.1.x earlier than 11.6.0+security-01. It is, therefore, affected by a cross-site scripting vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.5.3+security-01 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114820">https://www.tenable.com/plugins/was/114820</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.1.x < 11.4.3+security-01 Cross-site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114819</link>
            <guid>https://www.tenable.com/plugins/was/114819</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114819 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.1.x < 11.4.3+security-01 Cross-site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 11.1.x earlier than 11.2.8+security-01, or 11.1.x earlier than 11.3.5+security-01, or 11.1.x earlier than 11.4.3+security-01, or 11.1.x earlier than 11.5.3+security-01, or 11.1.x earlier than 11.6.0+security-01. It is, therefore, affected by a cross-site scripting vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.4.3+security-01 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114819">https://www.tenable.com/plugins/was/114819</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.1.x < 11.3.5+security-01 Cross-site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114818</link>
            <guid>https://www.tenable.com/plugins/was/114818</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114818 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.1.x < 11.3.5+security-01 Cross-site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 11.1.x earlier than 11.2.8+security-01, or 11.1.x earlier than 11.3.5+security-01, or 11.1.x earlier than 11.4.3+security-01, or 11.1.x earlier than 11.5.3+security-01, or 11.1.x earlier than 11.6.0+security-01. It is, therefore, affected by a cross-site scripting vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.3.5+security-01 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114818">https://www.tenable.com/plugins/was/114818</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.1.x < 11.2.8+security-01 Cross-site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114817</link>
            <guid>https://www.tenable.com/plugins/was/114817</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114817 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.1.x < 11.2.8+security-01 Cross-site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is 11.1.x earlier than 11.2.8+security-01, or 11.1.x earlier than 11.3.5+security-01, or 11.1.x earlier than 11.4.3+security-01, or 11.1.x earlier than 11.5.3+security-01, or 11.1.x earlier than 11.6.0+security-01. It is, therefore, affected by a cross-site scripting vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.2.8+security-01 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114817">https://www.tenable.com/plugins/was/114817</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.6.x < 11.6.1 Cross-site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114816</link>
            <guid>https://www.tenable.com/plugins/was/114816</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114816 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.6.x < 11.6.1 Cross-site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 10.4.18, or 11.2.x earlier than 11.2.9, or 11.3.x earlier than 11.3.6, or 11.4.x earlier than 11.4.4, or 11.5.x earlier than 11.5.4, or 11.6.x earlier than 11.6.1. It is, therefore, affected by a cross-site scripting vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.6.1 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114816">https://www.tenable.com/plugins/was/114816</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.5.x < 11.5.4 Cross-site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114815</link>
            <guid>https://www.tenable.com/plugins/was/114815</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114815 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.5.x < 11.5.4 Cross-site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 10.4.18, or 11.2.x earlier than 11.2.9, or 11.3.x earlier than 11.3.6, or 11.4.x earlier than 11.4.4, or 11.5.x earlier than 11.5.4, or 11.6.x earlier than 11.6.1. It is, therefore, affected by a cross-site scripting vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.5.4 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114815">https://www.tenable.com/plugins/was/114815</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.4.x < 11.4.4 Cross-site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114814</link>
            <guid>https://www.tenable.com/plugins/was/114814</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114814 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.4.x < 11.4.4 Cross-site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 10.4.18, or 11.2.x earlier than 11.2.9, or 11.3.x earlier than 11.3.6, or 11.4.x earlier than 11.4.4, or 11.5.x earlier than 11.5.4, or 11.6.x earlier than 11.6.1. It is, therefore, affected by a cross-site scripting vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.4.4 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114814">https://www.tenable.com/plugins/was/114814</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.3.x < 11.3.6 Cross-site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114813</link>
            <guid>https://www.tenable.com/plugins/was/114813</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114813 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.3.x < 11.3.6 Cross-site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 10.4.18, or 11.2.x earlier than 11.2.9, or 11.3.x earlier than 11.3.6, or 11.4.x earlier than 11.4.4, or 11.5.x earlier than 11.5.4, or 11.6.x earlier than 11.6.1. It is, therefore, affected by a cross-site scripting vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.3.6 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114813">https://www.tenable.com/plugins/was/114813</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.2.x < 11.2.9 Cross-site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114812</link>
            <guid>https://www.tenable.com/plugins/was/114812</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114812 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.2.x < 11.2.9 Cross-site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 10.4.18, or 11.2.x earlier than 11.2.9, or 11.3.x earlier than 11.3.6, or 11.4.x earlier than 11.4.4, or 11.5.x earlier than 11.5.4, or 11.6.x earlier than 11.6.1. It is, therefore, affected by a cross-site scripting vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.2.9 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114812">https://www.tenable.com/plugins/was/114812</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana < 10.4.18 Cross-site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114811</link>
            <guid>https://www.tenable.com/plugins/was/114811</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114811 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana < 10.4.18 Cross-site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 10.4.18, or 11.2.x earlier than 11.2.9, or 11.3.x earlier than 11.3.6, or 11.4.x earlier than 11.4.4, or 11.5.x earlier than 11.5.4, or 11.6.x earlier than 11.6.1. It is, therefore, affected by a cross-site scripting vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 10.4.18 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114811">https://www.tenable.com/plugins/was/114811</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 12.0.x < 12.0.1 Improper Access Control]]></title>
            <link>https://www.tenable.com/plugins/was/114810</link>
            <guid>https://www.tenable.com/plugins/was/114810</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114810 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 12.0.x < 12.0.1 Improper Access Control<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 10.4.19, or 11.2.x earlier than 11.2.10, or 11.3.x earlier than 11.3.7, or 11.4.x earlier than 11.4.5, or 11.5.x earlier than 11.5.5, or 11.6.x earlier than 11.6.2, or 12.0.x earlier than 12.0.1. It is, therefore, affected by a improper access control vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 12.0.1 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114810">https://www.tenable.com/plugins/was/114810</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.6.x < 11.6.2 Improper Access Control]]></title>
            <link>https://www.tenable.com/plugins/was/114809</link>
            <guid>https://www.tenable.com/plugins/was/114809</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114809 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.6.x < 11.6.2 Improper Access Control<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 10.4.19, or 11.2.x earlier than 11.2.10, or 11.3.x earlier than 11.3.7, or 11.4.x earlier than 11.4.5, or 11.5.x earlier than 11.5.5, or 11.6.x earlier than 11.6.2, or 12.0.x earlier than 12.0.1. It is, therefore, affected by a improper access control vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.6.2 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114809">https://www.tenable.com/plugins/was/114809</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.5.x < 11.5.5 Improper Access Control]]></title>
            <link>https://www.tenable.com/plugins/was/114808</link>
            <guid>https://www.tenable.com/plugins/was/114808</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114808 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.5.x < 11.5.5 Improper Access Control<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 10.4.19, or 11.2.x earlier than 11.2.10, or 11.3.x earlier than 11.3.7, or 11.4.x earlier than 11.4.5, or 11.5.x earlier than 11.5.5, or 11.6.x earlier than 11.6.2, or 12.0.x earlier than 12.0.1. It is, therefore, affected by a improper access control vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.5.5 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114808">https://www.tenable.com/plugins/was/114808</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.4.x < 11.4.5 Improper Access Control]]></title>
            <link>https://www.tenable.com/plugins/was/114807</link>
            <guid>https://www.tenable.com/plugins/was/114807</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114807 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.4.x < 11.4.5 Improper Access Control<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 10.4.19, or 11.2.x earlier than 11.2.10, or 11.3.x earlier than 11.3.7, or 11.4.x earlier than 11.4.5, or 11.5.x earlier than 11.5.5, or 11.6.x earlier than 11.6.2, or 12.0.x earlier than 12.0.1. It is, therefore, affected by a improper access control vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.4.5 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114807">https://www.tenable.com/plugins/was/114807</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.3.x < 11.3.7 Improper Access Control]]></title>
            <link>https://www.tenable.com/plugins/was/114806</link>
            <guid>https://www.tenable.com/plugins/was/114806</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114806 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.3.x < 11.3.7 Improper Access Control<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 10.4.19, or 11.2.x earlier than 11.2.10, or 11.3.x earlier than 11.3.7, or 11.4.x earlier than 11.4.5, or 11.5.x earlier than 11.5.5, or 11.6.x earlier than 11.6.2, or 12.0.x earlier than 12.0.1. It is, therefore, affected by a improper access control vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.3.7 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114806">https://www.tenable.com/plugins/was/114806</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana 11.2.x < 11.2.10 Improper Access Control]]></title>
            <link>https://www.tenable.com/plugins/was/114805</link>
            <guid>https://www.tenable.com/plugins/was/114805</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114805 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana 11.2.x < 11.2.10 Improper Access Control<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 10.4.19, or 11.2.x earlier than 11.2.10, or 11.3.x earlier than 11.3.7, or 11.4.x earlier than 11.4.5, or 11.5.x earlier than 11.5.5, or 11.6.x earlier than 11.6.2, or 12.0.x earlier than 12.0.1. It is, therefore, affected by a improper access control vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 11.2.10 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114805">https://www.tenable.com/plugins/was/114805</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Grafana < 10.4.19 Improper Access Control]]></title>
            <link>https://www.tenable.com/plugins/was/114804</link>
            <guid>https://www.tenable.com/plugins/was/114804</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114804 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Grafana < 10.4.19 Improper Access Control<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Grafana install hosted on the remote host is earlier than 10.4.19, or 11.2.x earlier than 11.2.10, or 11.3.x earlier than 11.3.7, or 11.4.x earlier than 11.4.5, or 11.5.x earlier than 11.5.5, or 11.6.x earlier than 11.6.2, or 12.0.x earlier than 12.0.1. It is, therefore, affected by a improper access control vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Grafana version 10.4.19 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114804">https://www.tenable.com/plugins/was/114804</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MCP Client Configuration File Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114803</link>
            <guid>https://www.tenable.com/plugins/was/114803</guid>
            <pubDate>Fri, 23 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114803 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>MCP Client Configuration File Detected<br /></span>
      <h3>Description</h3>
      <span>MCP (Model Context Protocol) configuration files allow specific softwares such as IDEs like Cursor to interact with MCP servers. These files may contain sensitive information which could assist an attack to conduct further attacks.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to this client configuration file or delete it if not required by the target web application. Ensure that all potential secrets available in the file are rotated.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114803">https://www.tenable.com/plugins/was/114803</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Jira 10.5.x < 10.5.1 Privilege Escalation]]></title>
            <link>https://www.tenable.com/plugins/was/114802</link>
            <guid>https://www.tenable.com/plugins/was/114802</guid>
            <pubDate>Thu, 22 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114802 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Jira 10.5.x < 10.5.1 Privilege Escalation<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Jira application running on the remote host is prior to 9.12.2, 10.3.x prior to 10.3.5 or 10.5.x prior to 10.5.1. It is, therefore, affected by a privilege escalation vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Jira version 10.5.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114802">https://www.tenable.com/plugins/was/114802</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Jira 10.3.x < 10.3.5 Privilege Escalation]]></title>
            <link>https://www.tenable.com/plugins/was/114801</link>
            <guid>https://www.tenable.com/plugins/was/114801</guid>
            <pubDate>Thu, 22 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114801 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Jira 10.3.x < 10.3.5 Privilege Escalation<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Jira application running on the remote host is prior to 9.12.2, 10.3.x prior to 10.3.5 or 10.5.x prior to 10.5.1. It is, therefore, affected by a privilege escalation vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Jira version 10.3.5 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114801">https://www.tenable.com/plugins/was/114801</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Jira < 9.12.20 Privilege Escalation]]></title>
            <link>https://www.tenable.com/plugins/was/114800</link>
            <guid>https://www.tenable.com/plugins/was/114800</guid>
            <pubDate>Thu, 22 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114800 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Jira < 9.12.20 Privilege Escalation<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Jira application running on the remote host is prior to 9.12.2, 10.3.x prior to 10.3.5 or 10.5.x prior to 10.5.1. It is, therefore, affected by a privilege escalation vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Jira version 9.12.20 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114800">https://www.tenable.com/plugins/was/114800</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SonicWall SMA < 10.2.1.14-75sv Unauthenticated Arbitrary File Read]]></title>
            <link>https://www.tenable.com/plugins/was/114799</link>
            <guid>https://www.tenable.com/plugins/was/114799</guid>
            <pubDate>Thu, 22 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114799 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>SonicWall SMA < 10.2.1.14-75sv Unauthenticated Arbitrary File Read<br /></span>
      <h3>Description</h3>
      <span>SonicWall Secure Mobile Access (SMA) versions prior to 10.2.1.14-75sv are affected by an unauthenticated arbitrary file read vulnerability. This vulnerability allows an unauthenticated attacker to read arbitrary files on the system, potentially leading to sensitive information disclosure.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to SonicWall Secure Mobile Access (SMA) version 10.2.1.14-75sv or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114799">https://www.tenable.com/plugins/was/114799</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Label Studio < 1.18.0 Reflected Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114798</link>
            <guid>https://www.tenable.com/plugins/was/114798</guid>
            <pubDate>Thu, 22 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114798 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Label Studio < 1.18.0 Reflected Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>Label Studio versions prior to 1.18.0 are vulnerable to a Reflected Cross-Site Scripting on '/projects/upload-example/' endpoint. This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Label Studio 1.18.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114798">https://www.tenable.com/plugins/was/114798</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MCP Inspector Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114797</link>
            <guid>https://www.tenable.com/plugins/was/114797</guid>
            <pubDate>Thu, 22 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114797 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>MCP Inspector Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational notice that the scanner was able to detect an MCP (Model Context Procol) Inspector instance on the target server.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114797">https://www.tenable.com/plugins/was/114797</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Content Security Policy Missing 'Report-To']]></title>
            <link>https://www.tenable.com/plugins/was/114796</link>
            <guid>https://www.tenable.com/plugins/was/114796</guid>
            <pubDate>Thu, 22 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114796 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>Content Security Policy Missing 'Report-To'<br /></span>
      <h3>Description</h3>
      <span>Content Security Policy (CSP) is a web security standard that helps to mitigate attacks like cross-site scripting (XSS), clickjacking or mixed content issues. CSP provides mechanisms to websites to restrict content that browsers will be allowed to load.<br /></span><span><br /></span><span>The 'report-to' directive allows websites to specify a reporting endpoint where browsers can send CSP violation reports. This helps administrators monitor policy violations and fine-tune their security policies.<br /></span><span><br /></span><span>While a Content Security Policy has been detected on this host, it is missing the 'report-to' directive, which means potential violations won't be reported automatically. This reduces visibility into security events that could help identify and remediate issues.<br /></span>
      <h3>Solution</h3>
      <span>Add the 'report-to' directive to your existing Content Security Policy header.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114796">https://www.tenable.com/plugins/was/114796</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FortiOS 7.0.x < 7.0.13 / 7.2.x < 7.2.6 / 7.4.x < 7.4.2 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114795</link>
            <guid>https://www.tenable.com/plugins/was/114795</guid>
            <pubDate>Thu, 22 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114795 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>FortiOS 7.0.x < 7.0.13 / 7.2.x < 7.2.6 / 7.4.x < 7.4.2 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>FortiOS version 6.0.x prior to 6.0.16 or 6.2.x prior to 6.2.15 or 6.4.x prior to 6.4.14 or 7.0.x prior to 7.0.13 or 7.2.x prior to 7.2.6 or 7.4.x prior to 7.4.2 and FortiProxy version 7.0.x prior to 7.0.14 or 7.2.x prior to 7.2.8 or 7.4.x prior to 7.4.2 are affected by a vulnerability allowing allows a remote attacker to execute arbitrary code or command through a specially crafted request.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to FortiOS 6.0.17, 6.2.15, 6.4.14, 7.0.13, 7.2.6, 7.4.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114795">https://www.tenable.com/plugins/was/114795</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ivanti Endpoint Manager Mobile < 11.12.0.5 / < 12.3.0.2 / < 12.4.0.2 / < 12.5.0.1  Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114794</link>
            <guid>https://www.tenable.com/plugins/was/114794</guid>
            <pubDate>Thu, 22 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114794 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Ivanti Endpoint Manager Mobile < 11.12.0.5 / < 12.3.0.2 / < 12.4.0.2 / < 12.5.0.1  Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>Ivanti Endpoint Manager Mobile (EPMM), formerly MobileIron Core, versions prior to 11.12.0.5 or 12.3.x prior to 12.3.0.2 or 12.4.x prior to 12.4.0.2 or 12.5.x prior to 12.5.0.1 suffer from an authentication bypass vulnerability, allowing unauthorized users to access restricted functionality or resources of the application without proper authentication.<br /></span>
      <h3>Solution</h3>
      <span>Update to Ivanti Endpoint Manager Mobile version 11.12.0.5, 12.3.0.2, 12.4.0.2, 12.5.0.1 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114794">https://www.tenable.com/plugins/was/114794</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MCP Manifest Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114793</link>
            <guid>https://www.tenable.com/plugins/was/114793</guid>
            <pubDate>Thu, 22 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114793 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>MCP Manifest Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational notice that the scanner was able to detect an MCP (Model Context Procol) manifest on the target server.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114793">https://www.tenable.com/plugins/was/114793</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Agent2Agent (A2A) Card Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114792</link>
            <guid>https://www.tenable.com/plugins/was/114792</guid>
            <pubDate>Thu, 22 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114792 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Agent2Agent (A2A) Card Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational notice that the scanner was able to detect an Agent2Agent (A2A) card on the target server.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114792">https://www.tenable.com/plugins/was/114792</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MCP Server Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114790</link>
            <guid>https://www.tenable.com/plugins/was/114790</guid>
            <pubDate>Thu, 22 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114790 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>MCP Server Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational notice that the scanner was able to detect a Model Context Protocol (MCP) HTTP server (using SSE or Streamable-HTTP transport mode) on the target server.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114790">https://www.tenable.com/plugins/was/114790</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 9.0.0-M1 < 9.0.104 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114789</link>
            <guid>https://www.tenable.com/plugins/was/114789</guid>
            <pubDate>Fri, 16 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114789 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 9.0.0-M1 < 9.0.104 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.104, 10.1.0-M1 prior to 10.1.40 or 11.0.0-M1 prior to 11.0.6. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A denial of service via invalid HTTP priority header. (CVE-2025-31650)<br /></span><span><br /></span><span> - A rewrite rule bypass. (CVE-2025-31651)<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.104 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114789">https://www.tenable.com/plugins/was/114789</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 10.1.0-M1 < 10.1.40 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114788</link>
            <guid>https://www.tenable.com/plugins/was/114788</guid>
            <pubDate>Fri, 16 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114788 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 10.1.0-M1 < 10.1.40 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.104, 10.1.0-M1 prior to 10.1.40 or 11.0.0-M1 prior to 11.0.6. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A denial of service via invalid HTTP priority header. (CVE-2025-31650)<br /></span><span><br /></span><span> - A rewrite rule bypass. (CVE-2025-31651)<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.40 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114788">https://www.tenable.com/plugins/was/114788</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 11.0.0-M1 < 11.0.6 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114787</link>
            <guid>https://www.tenable.com/plugins/was/114787</guid>
            <pubDate>Fri, 16 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114787 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 11.0.0-M1 < 11.0.6 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 prior to 9.0.104, 10.1.0-M1 prior to 10.1.40 or 11.0.0-M1 prior to 11.0.6. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A denial of service via invalid HTTP priority header. (CVE-2025-31650)<br /></span><span><br /></span><span> - A rewrite rule bypass. (CVE-2025-31651)<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 11.0.6 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114787">https://www.tenable.com/plugins/was/114787</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[GraphQL Import Failed]]></title>
            <link>https://www.tenable.com/plugins/was/114776</link>
            <guid>https://www.tenable.com/plugins/was/114776</guid>
            <pubDate>Fri, 16 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114776 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>GraphQL Import Failed<br /></span>
      <h3>Description</h3>
      <span>GraphQL schema file could not be imported and cannot be used during the scan.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114776">https://www.tenable.com/plugins/was/114776</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[GraphQL Import Success]]></title>
            <link>https://www.tenable.com/plugins/was/114775</link>
            <guid>https://www.tenable.com/plugins/was/114775</guid>
            <pubDate>Fri, 16 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114775 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>GraphQL Import Success<br /></span>
      <h3>Description</h3>
      <span>GraphQL schema file was successfully imported and can be used during the scan.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114775">https://www.tenable.com/plugins/was/114775</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[CraftCMS 3.x < 3.9.15 / 4.x < 4.14.15 / 5.x < 5.6.17 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114786</link>
            <guid>https://www.tenable.com/plugins/was/114786</guid>
            <pubDate>Tue, 29 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114786 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>CraftCMS 3.x < 3.9.15 / 4.x < 4.14.15 / 5.x < 5.6.17 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>CraftCMS version 3.x prior to 3.9.15 or 4.x prior to 4.14.15 or 5.x prior to 5.6.16 is vulnerable to a Remote Code Execution (RCE) in the action endpoint.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to CraftCMS version 3.9.15, 4.14.15, 5.6.17 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114786">https://www.tenable.com/plugins/was/114786</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SAP NetWeaver Visual Composer Metadata Uploader Arbitrary File Upload]]></title>
            <link>https://www.tenable.com/plugins/was/114785</link>
            <guid>https://www.tenable.com/plugins/was/114785</guid>
            <pubDate>Tue, 29 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114785 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>SAP NetWeaver Visual Composer Metadata Uploader Arbitrary File Upload<br /></span>
      <h3>Description</h3>
      <span>SAP NetWeaver Visual Composer Metadata Uploader is affected by an improper authorization vulnerability allowing an unauthenticated attacker to upload arbitrary files allowing to achieve a Remote Code Execution.<br /></span>
      <h3>Solution</h3>
      <span>Refer to the SAP advisory for mitigation options.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114785">https://www.tenable.com/plugins/was/114785</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Citrix Netscaler 14.1.x < 14.1-25.53 Information Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/114784</link>
            <guid>https://www.tenable.com/plugins/was/114784</guid>
            <pubDate>Tue, 29 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114784 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Citrix Netscaler 14.1.x < 14.1-25.53 Information Disclosure<br /></span>
      <h3>Description</h3>
      <span>Citrix Netscaler version 14.1.x prior to 14.1-25.53 is affected by an information disclosure vulnerability. An unauthenticated remote attacker can exploit this vulnerability to gain access to sensitive information, including the Citrix Netscaler management console and SDX SVM.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Citrix Netscaler version 14.1-25.53 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114784">https://www.tenable.com/plugins/was/114784</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SureTriggers Plugin for WordPress < 1.0.79 Authorization Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114783</link>
            <guid>https://www.tenable.com/plugins/was/114783</guid>
            <pubDate>Tue, 29 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114783 with High Severity</p>
      <h3>Synopsis</h3>
      <span>SureTriggers Plugin for WordPress < 1.0.79 Authorization Bypass<br /></span>
      <h3>Description</h3>
      <span>The WordPress SureTriggers Plugin installed on the remote host is affected by an Authorization Bypass.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to SureTriggers Plugin for WordPress 1.0.79<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114783">https://www.tenable.com/plugins/was/114783</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Greenshift Plugin for WordPress < 11.4.5 Arbitrary File Upload]]></title>
            <link>https://www.tenable.com/plugins/was/114782</link>
            <guid>https://www.tenable.com/plugins/was/114782</guid>
            <pubDate>Tue, 29 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114782 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Greenshift Plugin for WordPress < 11.4.5 Arbitrary File Upload<br /></span>
      <h3>Description</h3>
      <span>The WordPress Greenshift Plugin installed on the remote host is affected by an Arbitrary File Upload.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Greenshift Plugin for WordPress 11.4.5<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114782">https://www.tenable.com/plugins/was/114782</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Jira 9.12.x < 9.12.22 XML External Entity]]></title>
            <link>https://www.tenable.com/plugins/was/114781</link>
            <guid>https://www.tenable.com/plugins/was/114781</guid>
            <pubDate>Tue, 29 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114781 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Jira 9.12.x < 9.12.22 XML External Entity<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Jira application running on the remote host is 9.12.x prior to 9.12.22. It is, therefore, affected by an XML External Entity (XXE) vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Jira version 9.12.22 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114781">https://www.tenable.com/plugins/was/114781</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[NPM Debug Log File Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114780</link>
            <guid>https://www.tenable.com/plugins/was/114780</guid>
            <pubDate>Tue, 29 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114780 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>NPM Debug Log File Detected<br /></span>
      <h3>Description</h3>
      <span>An NPM debug log file have been detected on the target web application. These files may contain sensitive information which could assist an attack to conduct further attacks.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to the log file or locate it outside the public webroot where possible.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114780">https://www.tenable.com/plugins/was/114780</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Rails Configuration File Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114779</link>
            <guid>https://www.tenable.com/plugins/was/114779</guid>
            <pubDate>Tue, 29 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114779 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Rails Configuration File Detected<br /></span>
      <h3>Description</h3>
      <span>A Ruby on Rails configuration file have been detected on the target web application. These files may contain sensitive information which could assist an attack to conduct further attacks.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to the config file or locate it outside the public webroot where possible.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114779">https://www.tenable.com/plugins/was/114779</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Vite < 4.5.13 / 5.0.x < 5.4.18 / 6.0.x < 6.0.15 / 6.1.x < 6.1.5 / 6.2.x < 6.2.6 Arbitrary File Read]]></title>
            <link>https://www.tenable.com/plugins/was/114778</link>
            <guid>https://www.tenable.com/plugins/was/114778</guid>
            <pubDate>Thu, 17 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114778 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Vite < 4.5.13 / 5.0.x < 5.4.18 / 6.0.x < 6.0.15 / 6.1.x < 6.1.5 / 6.2.x < 6.2.6 Arbitrary File Read<br /></span>
      <h3>Description</h3>
      <span>Vite version prior to 4.5.13, 5.0.x prior to 5.4.18, 6.0.x prior to 6.0.15, 6.1.x prior to 6.1.5 or 6.2.x prior to 6.2.6 are affected by a vulnerability allowing unauthenticated remote attackers to read arbitrary files on the affected host when the app is exposing the Vite dev server to the network.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Vite 4.5.13, 5.4.18, 6.0.15, 6.1.5, 6.2.6 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114778">https://www.tenable.com/plugins/was/114778</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FortiOS 7.0.x < 7.0.16 Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114777</link>
            <guid>https://www.tenable.com/plugins/was/114777</guid>
            <pubDate>Thu, 17 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114777 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>FortiOS 7.0.x < 7.0.16 Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>FortiOS version 7.0.x prior to 7.0.16 and FortiProxy version 7.0.x prior to 7.0.19 or 7.2.x prior to 7.2.12 are affected by a vulnerability allowing allows a remote attacker to gain super-admin privileges via a specific crafted requests.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to FortiOS 7.0.16 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114777">https://www.tenable.com/plugins/was/114777</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Joomla! 4.x < 4.4.13 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114774</link>
            <guid>https://www.tenable.com/plugins/was/114774</guid>
            <pubDate>Thu, 17 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114774 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Joomla! 4.x < 4.4.13 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the instance of Joomla! running on the remote web server is 4.x prior to 4.4.13 or 5.x prior to 5.2.6. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span> - Improper handling of identifiers lead to a SQL injection vulnerability in the quoteNameStr method of the database package. (CVE-2025-25226)<br /></span><span><br /></span><span> - Insufficient state checks lead to a vector that allows to bypass 2FA checks. (CVE-2025-25227)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Joomla! version 4.4.13 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114774">https://www.tenable.com/plugins/was/114774</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Joomla! 5.x < 5.2.6 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114773</link>
            <guid>https://www.tenable.com/plugins/was/114773</guid>
            <pubDate>Thu, 17 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114773 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Joomla! 5.x < 5.2.6 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the instance of Joomla! running on the remote web server is 4.x prior to 4.4.13 or 5.x prior to 5.2.6. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span> - Improper handling of identifiers lead to a SQL injection vulnerability in the quoteNameStr method of the database package. (CVE-2025-25226)<br /></span><span><br /></span><span> - Insufficient state checks lead to a vector that allows to bypass 2FA checks. (CVE-2025-25227)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Joomla! version 5.2.6 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114773">https://www.tenable.com/plugins/was/114773</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Vite < 4.5.10 / 5.0.x < 5.4.15 / 6.0.x < 6.0.12 / 6.1.x < 6.1.2 / 6.2.x < 6.2.3 Arbitrary File Read]]></title>
            <link>https://www.tenable.com/plugins/was/114772</link>
            <guid>https://www.tenable.com/plugins/was/114772</guid>
            <pubDate>Thu, 17 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114772 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Vite < 4.5.10 / 5.0.x < 5.4.15 / 6.0.x < 6.0.12 / 6.1.x < 6.1.2 / 6.2.x < 6.2.3 Arbitrary File Read<br /></span>
      <h3>Description</h3>
      <span>Vite version prior to 4.5.10, 5.0.x prior to 5.4.15, 6.0.x prior to 6.0.12, 6.1.x prior to 6.1.2 or 6.2.x prior to 6.2.3 are affected by a vulnerability allowing unauthenticated remote attackers to read arbitrary files on the affected host when the app is exposing the Vite dev server to the network.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Vite 4.5.10, 5.4.15, 6.0.12, 6.1.2, 6.2.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114772">https://www.tenable.com/plugins/was/114772</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Next.js 11.1.4 < 12.3.5 Authorization Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114771</link>
            <guid>https://www.tenable.com/plugins/was/114771</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114771 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Next.js 11.1.4 < 12.3.5 Authorization Bypass<br /></span>
      <h3>Description</h3>
      <span>The version of Next.js installed on the remote host is 11.1.4 prior to 12.3.5, 13.0.x prior to 13.5.9, 14.x prior to 14.2.25 or 15.x prior to 15.2.3. It is, therefore, affected by Authorization Bypass if the authorization check occurs in middleware.<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit this issue but has instead relied only on application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Next.js version 12.3.5 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114771">https://www.tenable.com/plugins/was/114771</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Next.js 14.0.x < 14.2.10 Cache Poisoning]]></title>
            <link>https://www.tenable.com/plugins/was/114770</link>
            <guid>https://www.tenable.com/plugins/was/114770</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114770 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Next.js 14.0.x < 14.2.10 Cache Poisoning<br /></span>
      <h3>Description</h3>
      <span>The version of Next.js installed on the remote host is 13.5.1 prior to 13.5.7 or 14.0.x prior to 14.2.10. It is, therefore, affected by a Cache Poisoning.<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit this issue but has instead relied only on application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Next.js version 14.2.10 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114770">https://www.tenable.com/plugins/was/114770</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Next.js 13.5.1 < 13.5.7 Cache Poisoning]]></title>
            <link>https://www.tenable.com/plugins/was/114769</link>
            <guid>https://www.tenable.com/plugins/was/114769</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114769 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Next.js 13.5.1 < 13.5.7 Cache Poisoning<br /></span>
      <h3>Description</h3>
      <span>The version of Next.js installed on the remote host is 13.5.1 prior to 13.5.7 or 14.0.x prior to 14.2.10. It is, therefore, affected by a Cache Poisoning.<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit this issue but has instead relied only on application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Next.js version 13.5.7 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114769">https://www.tenable.com/plugins/was/114769</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Next.js 9.5.5 < 14.2.15 Authorization Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114768</link>
            <guid>https://www.tenable.com/plugins/was/114768</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114768 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Next.js 9.5.5 < 14.2.15 Authorization Bypass<br /></span>
      <h3>Description</h3>
      <span>The version of Next.js installed on the remote host is 9.5.5 prior to 14.2.15. It is, therefore, affected by Authorization Bypass if the authorization check occurs in middleware.<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit this issue but has instead relied only on application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Next.js version 14.2.15 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114768">https://www.tenable.com/plugins/was/114768</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle < 3.9.20 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114767</link>
            <guid>https://www.tenable.com/plugins/was/114767</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114767 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle < 3.9.20 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.20, 3.11.x prior to 3.11.13, 4.0.x prior to 4.0.7 or 4.1.x prior to 4.1.2. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- The course participation report required additional checks to prevent roles being displayed which the user did not have access to view.<br /></span><span><br /></span><span>- Insufficient filtering of grade report history made it possible for teachers to access the names of users they could not otherwise access.<br /></span><span><br /></span><span>- The Mustache pix helper contained a potential Mustache injection risk if combined with user input (note: This did not appear to be implemented/exploitable anywhere in the core Moodle LMS).<br /></span><span><br /></span><span>- If the algebra filter was enabled but not functional (eg the necessary binaries were missing from the server), it presented an XSS risk.<br /></span><span><br /></span><span>- Content output by the database auto-linking filter required additional sanitizing to prevent an XSS risk.<br /></span><span><br /></span><span>- Insufficient sanitizing in backup resulted in an arbitrary file read risk. The capability to access this feature is only available to teachers, managers and admins by default.<br /></span><span><br /></span><span>- Insufficient validation of profile field availability condition resulted in an SQL injection risk (by default only available to teachers and managers).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 3.9.20 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114767">https://www.tenable.com/plugins/was/114767</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 3.11.x < 3.11.13 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114766</link>
            <guid>https://www.tenable.com/plugins/was/114766</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114766 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 3.11.x < 3.11.13 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.20, 3.11.x prior to 3.11.13, 4.0.x prior to 4.0.7 or 4.1.x prior to 4.1.2. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- The course participation report required additional checks to prevent roles being displayed which the user did not have access to view.<br /></span><span><br /></span><span>- Insufficient filtering of grade report history made it possible for teachers to access the names of users they could not otherwise access.<br /></span><span><br /></span><span>- The Mustache pix helper contained a potential Mustache injection risk if combined with user input (note: This did not appear to be implemented/exploitable anywhere in the core Moodle LMS).<br /></span><span><br /></span><span>- If the algebra filter was enabled but not functional (eg the necessary binaries were missing from the server), it presented an XSS risk.<br /></span><span><br /></span><span>- Content output by the database auto-linking filter required additional sanitizing to prevent an XSS risk.<br /></span><span><br /></span><span>- Insufficient sanitizing in backup resulted in an arbitrary file read risk. The capability to access this feature is only available to teachers, managers and admins by default.<br /></span><span><br /></span><span>- Insufficient validation of profile field availability condition resulted in an SQL injection risk (by default only available to teachers and managers).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 3.11.13 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114766">https://www.tenable.com/plugins/was/114766</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.0.x < 4.0.7 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114765</link>
            <guid>https://www.tenable.com/plugins/was/114765</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114765 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.0.x < 4.0.7 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.20, 3.11.x prior to 3.11.13, 4.0.x prior to 4.0.7 or 4.1.x prior to 4.1.2. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- The course participation report required additional checks to prevent roles being displayed which the user did not have access to view.<br /></span><span><br /></span><span>- Insufficient filtering of grade report history made it possible for teachers to access the names of users they could not otherwise access.<br /></span><span><br /></span><span>- The Mustache pix helper contained a potential Mustache injection risk if combined with user input (note: This did not appear to be implemented/exploitable anywhere in the core Moodle LMS).<br /></span><span><br /></span><span>- If the algebra filter was enabled but not functional (eg the necessary binaries were missing from the server), it presented an XSS risk.<br /></span><span><br /></span><span>- Content output by the database auto-linking filter required additional sanitizing to prevent an XSS risk.<br /></span><span><br /></span><span>- Insufficient sanitizing in backup resulted in an arbitrary file read risk. The capability to access this feature is only available to teachers, managers and admins by default.<br /></span><span><br /></span><span>- Insufficient validation of profile field availability condition resulted in an SQL injection risk (by default only available to teachers and managers).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.0.7 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114765">https://www.tenable.com/plugins/was/114765</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.1.x < 4.1.2 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114764</link>
            <guid>https://www.tenable.com/plugins/was/114764</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114764 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.1.x < 4.1.2 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.20, 3.11.x prior to 3.11.13, 4.0.x prior to 4.0.7 or 4.1.x prior to 4.1.2. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- The course participation report required additional checks to prevent roles being displayed which the user did not have access to view.<br /></span><span><br /></span><span>- Insufficient filtering of grade report history made it possible for teachers to access the names of users they could not otherwise access.<br /></span><span><br /></span><span>- The Mustache pix helper contained a potential Mustache injection risk if combined with user input (note: This did not appear to be implemented/exploitable anywhere in the core Moodle LMS).<br /></span><span><br /></span><span>- If the algebra filter was enabled but not functional (eg the necessary binaries were missing from the server), it presented an XSS risk.<br /></span><span><br /></span><span>- Content output by the database auto-linking filter required additional sanitizing to prevent an XSS risk.<br /></span><span><br /></span><span>- Insufficient sanitizing in backup resulted in an arbitrary file read risk. The capability to access this feature is only available to teachers, managers and admins by default.<br /></span><span><br /></span><span>- Insufficient validation of profile field availability condition resulted in an SQL injection risk (by default only available to teachers and managers).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.1.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114764">https://www.tenable.com/plugins/was/114764</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.1.x < 4.1.3 Arbitrary Folder Creation]]></title>
            <link>https://www.tenable.com/plugins/was/114763</link>
            <guid>https://www.tenable.com/plugins/was/114763</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114763 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.1.x < 4.1.3 Arbitrary Folder Creation<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 4.1.3. It is, therefore, affected by an Arbitrary Folder creation in TinyMCE.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.1.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114763">https://www.tenable.com/plugins/was/114763</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle < 3.9.21 SQL injection]]></title>
            <link>https://www.tenable.com/plugins/was/114762</link>
            <guid>https://www.tenable.com/plugins/was/114762</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114762 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle < 3.9.21 SQL injection<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.21, 3.11.x prior to 3.11.14, 4.0.x prior to 4.0.8 or 4.1.x prior to 4.1.3. It is, therefore, affected by a limited SQL injection in functionality used by the Wiki activity when listing pages.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 3.9.21 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114762">https://www.tenable.com/plugins/was/114762</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 3.11.x < 3.11.14 SQL injection]]></title>
            <link>https://www.tenable.com/plugins/was/114761</link>
            <guid>https://www.tenable.com/plugins/was/114761</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114761 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 3.11.x < 3.11.14 SQL injection<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.21, 3.11.x prior to 3.11.14, 4.0.x prior to 4.0.8 or 4.1.x prior to 4.1.3. It is, therefore, affected by a limited SQL injection in functionality used by the Wiki activity when listing pages.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 3.11.14 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114761">https://www.tenable.com/plugins/was/114761</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.0.x < 4.0.8 SQL injection]]></title>
            <link>https://www.tenable.com/plugins/was/114760</link>
            <guid>https://www.tenable.com/plugins/was/114760</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114760 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.0.x < 4.0.8 SQL injection<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.21, 3.11.x prior to 3.11.14, 4.0.x prior to 4.0.8 or 4.1.x prior to 4.1.3. It is, therefore, affected by a limited SQL injection in functionality used by the Wiki activity when listing pages.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.0.8 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114760">https://www.tenable.com/plugins/was/114760</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.1.x < 4.1.3 SQL injection]]></title>
            <link>https://www.tenable.com/plugins/was/114759</link>
            <guid>https://www.tenable.com/plugins/was/114759</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114759 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.1.x < 4.1.3 SQL injection<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.21, 3.11.x prior to 3.11.14, 4.0.x prior to 4.0.8 or 4.1.x prior to 4.1.3. It is, therefore, affected by a limited SQL injection in functionality used by the Wiki activity when listing pages.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.1.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114759">https://www.tenable.com/plugins/was/114759</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 3.11.x < 3.11.15 XSS Risk on groups page]]></title>
            <link>https://www.tenable.com/plugins/was/114758</link>
            <guid>https://www.tenable.com/plugins/was/114758</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114758 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 3.11.x < 3.11.15 XSS Risk on groups page<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 3.11.x prior to 3.11.15, 4.0.x prior to 4.0.9, 4.1.x prior to 4.1.4 or 4.2.x prior to 4.2.1. It is, therefore, affected by a Cross-Site Scripting in content on the groups page.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.0.9 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114758">https://www.tenable.com/plugins/was/114758</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.0.x < 4.0.9 XSS Risk on groups page]]></title>
            <link>https://www.tenable.com/plugins/was/114757</link>
            <guid>https://www.tenable.com/plugins/was/114757</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114757 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.0.x < 4.0.9 XSS Risk on groups page<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 3.11.x prior to 3.11.15, 4.0.x prior to 4.0.9, 4.1.x prior to 4.1.4 or 4.2.x prior to 4.2.1. It is, therefore, affected by a Cross-Site Scripting in content on the groups page.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.0.9 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114757">https://www.tenable.com/plugins/was/114757</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.1.x < 4.1.4 XSS Risk on groups page]]></title>
            <link>https://www.tenable.com/plugins/was/114756</link>
            <guid>https://www.tenable.com/plugins/was/114756</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114756 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.1.x < 4.1.4 XSS Risk on groups page<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 3.11.x prior to 3.11.15, 4.0.x prior to 4.0.9, 4.1.x prior to 4.1.4 or 4.2.x prior to 4.2.1. It is, therefore, affected by a Cross-Site Scripting in content on the groups page.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.1.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114756">https://www.tenable.com/plugins/was/114756</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.2.x < 4.2.1 XSS Risk on groups page]]></title>
            <link>https://www.tenable.com/plugins/was/114755</link>
            <guid>https://www.tenable.com/plugins/was/114755</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114755 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.2.x < 4.2.1 XSS Risk on groups page<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 3.11.x prior to 3.11.15, 4.0.x prior to 4.0.9, 4.1.x prior to 4.1.4 or 4.2.x prior to 4.2.1. It is, therefore, affected by a Cross-Site Scripting in content on the groups page.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.2.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114755">https://www.tenable.com/plugins/was/114755</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle < 3.9.22 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114754</link>
            <guid>https://www.tenable.com/plugins/was/114754</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114754 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle < 3.9.22 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.22, 3.11.x prior to 3.11.15, 4.0.x prior to 4.0.9 or 4.1.x prior to 4.1.4. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- An issue in the logic used to check 0.0.0.0 against the cURL blocked hosts lists resulted in an SSRF risk.<br /></span><span><br /></span><span>- A limited SQL injection risk was identified on the Mnet SSO access control page.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 3.9.22 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114754">https://www.tenable.com/plugins/was/114754</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 3.11.x < 3.11.15 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114753</link>
            <guid>https://www.tenable.com/plugins/was/114753</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114753 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 3.11.x < 3.11.15 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.22, 3.11.x prior to 3.11.15, 4.0.x prior to 4.0.9 or 4.1.x prior to 4.1.4. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- An issue in the logic used to check 0.0.0.0 against the cURL blocked hosts lists resulted in an SSRF risk.<br /></span><span><br /></span><span>- A limited SQL injection risk was identified on the Mnet SSO access control page.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 3.11.15 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114753">https://www.tenable.com/plugins/was/114753</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.0.x < 4.0.9 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114752</link>
            <guid>https://www.tenable.com/plugins/was/114752</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114752 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.0.x < 4.0.9 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.22, 3.11.x prior to 3.11.15, 4.0.x prior to 4.0.9 or 4.1.x prior to 4.1.4. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- An issue in the logic used to check 0.0.0.0 against the cURL blocked hosts lists resulted in an SSRF risk.<br /></span><span><br /></span><span>- A limited SQL injection risk was identified on the Mnet SSO access control page.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.0.9 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114752">https://www.tenable.com/plugins/was/114752</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.1.x < 4.1.4 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114751</link>
            <guid>https://www.tenable.com/plugins/was/114751</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114751 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.1.x < 4.1.4 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.22, 3.11.x prior to 3.11.15, 4.0.x prior to 4.0.9 or 4.1.x prior to 4.1.4. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- An issue in the logic used to check 0.0.0.0 against the cURL blocked hosts lists resulted in an SSRF risk.<br /></span><span><br /></span><span>- A limited SQL injection risk was identified on the Mnet SSO access control page.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.1.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114751">https://www.tenable.com/plugins/was/114751</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle < 3.9.23 phpCAS Library Upgrade]]></title>
            <link>https://www.tenable.com/plugins/was/114750</link>
            <guid>https://www.tenable.com/plugins/was/114750</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114750 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle < 3.9.23 phpCAS Library Upgrade<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.23, 3.11.x prior to 3.11.16 or 4.0.x prior to 4.0.10. The phpCAS library included with Moodle has been upgraded to version 1.6.0, which includes a fix for a serious security issue.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 3.9.23 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114750">https://www.tenable.com/plugins/was/114750</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 3.11.x < 3.11.16 phpCAS Library Upgrade]]></title>
            <link>https://www.tenable.com/plugins/was/114749</link>
            <guid>https://www.tenable.com/plugins/was/114749</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114749 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 3.11.x < 3.11.16 phpCAS Library Upgrade<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.23, 3.11.x prior to 3.11.16 or 4.0.x prior to 4.0.10. The phpCAS library included with Moodle has been upgraded to version 1.6.0, which includes a fix for a serious security issue.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 3.11.16 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114749">https://www.tenable.com/plugins/was/114749</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.0.x < 4.0.10 phpCAS Library Upgrade]]></title>
            <link>https://www.tenable.com/plugins/was/114748</link>
            <guid>https://www.tenable.com/plugins/was/114748</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114748 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.0.x < 4.0.10 phpCAS Library Upgrade<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.23, 3.11.x prior to 3.11.16 or 4.0.x prior to 4.0.10. The phpCAS library included with Moodle has been upgraded to version 1.6.0, which includes a fix for a serious security issue.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.0.10 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114748">https://www.tenable.com/plugins/was/114748</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle < 3.9.23 JQuery UI Library Upgrade]]></title>
            <link>https://www.tenable.com/plugins/was/114747</link>
            <guid>https://www.tenable.com/plugins/was/114747</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114747 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle < 3.9.23 JQuery UI Library Upgrade<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.23 or 3.11.x prior to 3.11.16. The JQuery UI library included with Moodle has been upgraded to version 1.13.2, which includes fixes for multiples security issues.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 3.9.23 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114747">https://www.tenable.com/plugins/was/114747</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 3.11.x < 3.11.16 JQuery UI Library Upgrade]]></title>
            <link>https://www.tenable.com/plugins/was/114746</link>
            <guid>https://www.tenable.com/plugins/was/114746</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114746 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 3.11.x < 3.11.16 JQuery UI Library Upgrade<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.23 or 3.11.x prior to 3.11.16. The JQuery UI library included with Moodle has been upgraded to version 1.13.2, which includes fixes for multiples security issues.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 3.11.16 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114746">https://www.tenable.com/plugins/was/114746</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle < 3.9.23 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114745</link>
            <guid>https://www.tenable.com/plugins/was/114745</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114745 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle < 3.9.23 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.23, 3.11.x prior to 3.11.16, 4.0.x prior to 4.0.10, 4.1.x prior to 4.1.5 or 4.2.x prior to 4.2.2. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- Insufficient limitations made it possible for students to bypass sequential navigation during a quiz attempt.<br /></span><span><br /></span><span>- Insufficient capability checks resulted in competency framework tools being available to users without the relevant capability.<br /></span><span><br /></span><span>- The admin view all policies page URL required additional sanitizing to prevent an open redirect risk.<br /></span><span><br /></span><span>- Insufficient capability checks made it possible to fetch other users' message processor preferences data.<br /></span><span><br /></span><span>- It was possible to escalate stored self-XSS to stored XSS where users login via OAuth 2.<br /></span><span><br /></span><span>- Permission overrides on individual blocks in the system dashboard did not cascade to user dashboards.<br /></span><span><br /></span><span>- A remote code execution risk was identified where file repository reference properties are parsed.<br /></span><span><br /></span><span>- Incorrect domain matching logic made it possible to bypass the proxy, which could result in access to hosts intended to be blocked by the proxy.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 3.9.23 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114745">https://www.tenable.com/plugins/was/114745</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 3.11.x < 3.11.16 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114744</link>
            <guid>https://www.tenable.com/plugins/was/114744</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114744 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 3.11.x < 3.11.16 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.23, 3.11.x prior to 3.11.16, 4.0.x prior to 4.0.10, 4.1.x prior to 4.1.5 or 4.2.x prior to 4.2.2. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- Insufficient limitations made it possible for students to bypass sequential navigation during a quiz attempt.<br /></span><span><br /></span><span>- Insufficient capability checks resulted in competency framework tools being available to users without the relevant capability.<br /></span><span><br /></span><span>- The admin view all policies page URL required additional sanitizing to prevent an open redirect risk.<br /></span><span><br /></span><span>- Insufficient capability checks made it possible to fetch other users' message processor preferences data.<br /></span><span><br /></span><span>- It was possible to escalate stored self-XSS to stored XSS where users login via OAuth 2.<br /></span><span><br /></span><span>- Permission overrides on individual blocks in the system dashboard did not cascade to user dashboards.<br /></span><span><br /></span><span>- A remote code execution risk was identified where file repository reference properties are parsed.<br /></span><span><br /></span><span>- Incorrect domain matching logic made it possible to bypass the proxy, which could result in access to hosts intended to be blocked by the proxy.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 3.11.16 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114744">https://www.tenable.com/plugins/was/114744</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.0.x < 4.0.10 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114743</link>
            <guid>https://www.tenable.com/plugins/was/114743</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114743 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.0.x < 4.0.10 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.23, 3.11.x prior to 3.11.16, 4.0.x prior to 4.0.10, 4.1.x prior to 4.1.5 or 4.2.x prior to 4.2.2. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- Insufficient limitations made it possible for students to bypass sequential navigation during a quiz attempt.<br /></span><span><br /></span><span>- Insufficient capability checks resulted in competency framework tools being available to users without the relevant capability.<br /></span><span><br /></span><span>- The admin view all policies page URL required additional sanitizing to prevent an open redirect risk.<br /></span><span><br /></span><span>- Insufficient capability checks made it possible to fetch other users' message processor preferences data.<br /></span><span><br /></span><span>- It was possible to escalate stored self-XSS to stored XSS where users login via OAuth 2.<br /></span><span><br /></span><span>- Permission overrides on individual blocks in the system dashboard did not cascade to user dashboards.<br /></span><span><br /></span><span>- A remote code execution risk was identified where file repository reference properties are parsed.<br /></span><span><br /></span><span>- Incorrect domain matching logic made it possible to bypass the proxy, which could result in access to hosts intended to be blocked by the proxy.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.0.10 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114743">https://www.tenable.com/plugins/was/114743</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.1.x < 4.1.5 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114742</link>
            <guid>https://www.tenable.com/plugins/was/114742</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114742 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.1.x < 4.1.5 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.23, 3.11.x prior to 3.11.16, 4.0.x prior to 4.0.10, 4.1.x prior to 4.1.5 or 4.2.x prior to 4.2.2. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- Insufficient limitations made it possible for students to bypass sequential navigation during a quiz attempt.<br /></span><span><br /></span><span>- Insufficient capability checks resulted in competency framework tools being available to users without the relevant capability.<br /></span><span><br /></span><span>- The admin view all policies page URL required additional sanitizing to prevent an open redirect risk.<br /></span><span><br /></span><span>- Insufficient capability checks made it possible to fetch other users' message processor preferences data.<br /></span><span><br /></span><span>- It was possible to escalate stored self-XSS to stored XSS where users login via OAuth 2.<br /></span><span><br /></span><span>- Permission overrides on individual blocks in the system dashboard did not cascade to user dashboards.<br /></span><span><br /></span><span>- A remote code execution risk was identified where file repository reference properties are parsed.<br /></span><span><br /></span><span>- Incorrect domain matching logic made it possible to bypass the proxy, which could result in access to hosts intended to be blocked by the proxy.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.1.5 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114742">https://www.tenable.com/plugins/was/114742</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.2.x < 4.2.2 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114741</link>
            <guid>https://www.tenable.com/plugins/was/114741</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114741 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.2.x < 4.2.2 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.23, 3.11.x prior to 3.11.16, 4.0.x prior to 4.0.10, 4.1.x prior to 4.1.5 or 4.2.x prior to 4.2.2. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- Insufficient limitations made it possible for students to bypass sequential navigation during a quiz attempt.<br /></span><span><br /></span><span>- Insufficient capability checks resulted in competency framework tools being available to users without the relevant capability.<br /></span><span><br /></span><span>- The admin view all policies page URL required additional sanitizing to prevent an open redirect risk.<br /></span><span><br /></span><span>- Insufficient capability checks made it possible to fetch other users' message processor preferences data.<br /></span><span><br /></span><span>- It was possible to escalate stored self-XSS to stored XSS where users login via OAuth 2.<br /></span><span><br /></span><span>- Permission overrides on individual blocks in the system dashboard did not cascade to user dashboards.<br /></span><span><br /></span><span>- A remote code execution risk was identified where file repository reference properties are parsed.<br /></span><span><br /></span><span>- Incorrect domain matching logic made it possible to bypass the proxy, which could result in access to hosts intended to be blocked by the proxy.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.2.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114741">https://www.tenable.com/plugins/was/114741</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.2.x < 4.2.3 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114740</link>
            <guid>https://www.tenable.com/plugins/was/114740</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114740 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.2.x < 4.2.3 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.24 / 3.11.x prior to 3.11.17 / 4.0.x prior to 4.0.11 / 4.1.x prior to 4.1.6 / 4.2.x prior to 4.2.3. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- Forum summary report shows students from other groups when in Separate Groups mode<br /></span><span><br /></span><span>- RCE due to LFI risk in some misconfigured shared hosting environments<br /></span><span><br /></span><span>- Insufficient capability checks when updating the parent of a course category<br /></span><span><br /></span><span>- Make file serving endpoints revision control stricter<br /></span><span><br /></span><span>- XSS risk when previewing data in course upload tool<br /></span><span><br /></span><span>- Auto-populated H5P author name causes a potential information leak<br /></span><span><br /></span><span>- Stored XSS and potential IDOR risk in Wiki comments<br /></span><span><br /></span><span>- Students could see other students in "Only see own membership" groups<br /></span><span><br /></span><span>- XSS risk when using CSV grade import method<br /></span><span><br /></span><span>- Authenticated remote code execution risk in IMSCP<br /></span><span><br /></span><span>- Authenticated remote code execution risk in Lesson<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.2.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114740">https://www.tenable.com/plugins/was/114740</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.1.x < 4.1.6 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114739</link>
            <guid>https://www.tenable.com/plugins/was/114739</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114739 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.1.x < 4.1.6 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.24 / 3.11.x prior to 3.11.17 / 4.0.x prior to 4.0.11 / 4.1.x prior to 4.1.6 / 4.2.x prior to 4.2.3. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- Forum summary report shows students from other groups when in Separate Groups mode<br /></span><span><br /></span><span>- RCE due to LFI risk in some misconfigured shared hosting environments<br /></span><span><br /></span><span>- Insufficient capability checks when updating the parent of a course category<br /></span><span><br /></span><span>- Make file serving endpoints revision control stricter<br /></span><span><br /></span><span>- XSS risk when previewing data in course upload tool<br /></span><span><br /></span><span>- Auto-populated H5P author name causes a potential information leak<br /></span><span><br /></span><span>- Stored XSS and potential IDOR risk in Wiki comments<br /></span><span><br /></span><span>- Students could see other students in "Only see own membership" groups<br /></span><span><br /></span><span>- XSS risk when using CSV grade import method<br /></span><span><br /></span><span>- Authenticated remote code execution risk in IMSCP<br /></span><span><br /></span><span>- Authenticated remote code execution risk in Lesson<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.1.6 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114739">https://www.tenable.com/plugins/was/114739</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.0.x < 4.0.11 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114738</link>
            <guid>https://www.tenable.com/plugins/was/114738</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114738 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.0.x < 4.0.11 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.24 / 3.11.x prior to 3.11.17 / 4.0.x prior to 4.0.11 / 4.1.x prior to 4.1.6 / 4.2.x prior to 4.2.3. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- Forum summary report shows students from other groups when in Separate Groups mode<br /></span><span><br /></span><span>- RCE due to LFI risk in some misconfigured shared hosting environments<br /></span><span><br /></span><span>- Insufficient capability checks when updating the parent of a course category<br /></span><span><br /></span><span>- Make file serving endpoints revision control stricter<br /></span><span><br /></span><span>- XSS risk when previewing data in course upload tool<br /></span><span><br /></span><span>- Auto-populated H5P author name causes a potential information leak<br /></span><span><br /></span><span>- Stored XSS and potential IDOR risk in Wiki comments<br /></span><span><br /></span><span>- Students could see other students in "Only see own membership" groups<br /></span><span><br /></span><span>- XSS risk when using CSV grade import method<br /></span><span><br /></span><span>- Authenticated remote code execution risk in IMSCP<br /></span><span><br /></span><span>- Authenticated remote code execution risk in Lesson<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.0.11 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114738">https://www.tenable.com/plugins/was/114738</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 3.11.x < 3.11.17 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114737</link>
            <guid>https://www.tenable.com/plugins/was/114737</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114737 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 3.11.x < 3.11.17 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.24 / 3.11.x prior to 3.11.17 / 4.0.x prior to 4.0.11 / 4.1.x prior to 4.1.6 / 4.2.x prior to 4.2.3. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- Forum summary report shows students from other groups when in Separate Groups mode<br /></span><span><br /></span><span>- RCE due to LFI risk in some misconfigured shared hosting environments<br /></span><span><br /></span><span>- Insufficient capability checks when updating the parent of a course category<br /></span><span><br /></span><span>- Make file serving endpoints revision control stricter<br /></span><span><br /></span><span>- XSS risk when previewing data in course upload tool<br /></span><span><br /></span><span>- Auto-populated H5P author name causes a potential information leak<br /></span><span><br /></span><span>- Stored XSS and potential IDOR risk in Wiki comments<br /></span><span><br /></span><span>- Students could see other students in "Only see own membership" groups<br /></span><span><br /></span><span>- XSS risk when using CSV grade import method<br /></span><span><br /></span><span>- Authenticated remote code execution risk in IMSCP<br /></span><span><br /></span><span>- Authenticated remote code execution risk in Lesson<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 3.11.17 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114737">https://www.tenable.com/plugins/was/114737</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle < 3.9.24 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114736</link>
            <guid>https://www.tenable.com/plugins/was/114736</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114736 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle < 3.9.24 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.24 / 3.11.x prior to 3.11.17 / 4.0.x prior to 4.0.11 / 4.1.x prior to 4.1.6 / 4.2.x prior to 4.2.3. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- Forum summary report shows students from other groups when in Separate Groups mode<br /></span><span><br /></span><span>- RCE due to LFI risk in some misconfigured shared hosting environments<br /></span><span><br /></span><span>- Insufficient capability checks when updating the parent of a course category<br /></span><span><br /></span><span>- Make file serving endpoints revision control stricter<br /></span><span><br /></span><span>- XSS risk when previewing data in course upload tool<br /></span><span><br /></span><span>- Auto-populated H5P author name causes a potential information leak<br /></span><span><br /></span><span>- Stored XSS and potential IDOR risk in Wiki comments<br /></span><span><br /></span><span>- Students could see other students in "Only see own membership" groups<br /></span><span><br /></span><span>- XSS risk when using CSV grade import method<br /></span><span><br /></span><span>- Authenticated remote code execution risk in IMSCP<br /></span><span><br /></span><span>- Authenticated remote code execution risk in Lesson<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 3.9.24 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114736">https://www.tenable.com/plugins/was/114736</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.3.x < 4.3.1 Multiple Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114735</link>
            <guid>https://www.tenable.com/plugins/was/114735</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114735 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.3.x < 4.3.1 Multiple Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.2.x prior to 4.2.4 or 4.3.x prior to 4.3.1. It is, therefore, affected by multiple cross-site scripting:<br /></span><span><br /></span><span>- Reflected XSS risk on ad-hoc tasks page<br /></span><span><br /></span><span>- Reflected XSS risk in grader report search<br /></span><span><br /></span><span>- Stored XSS in grader report via user ID number<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.3.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114735">https://www.tenable.com/plugins/was/114735</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.2.x < 4.2.4 Multiple Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114734</link>
            <guid>https://www.tenable.com/plugins/was/114734</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114734 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.2.x < 4.2.4 Multiple Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.2.x prior to 4.2.4 or 4.3.x prior to 4.3.1. It is, therefore, affected by multiple cross-site scripting:<br /></span><span><br /></span><span>- Reflected XSS risk on ad-hoc tasks page<br /></span><span><br /></span><span>- Reflected XSS risk in grader report search<br /></span><span><br /></span><span>- Stored XSS in grader report via user ID number<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.2.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114734">https://www.tenable.com/plugins/was/114734</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.2.x < 4.2.4 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114733</link>
            <guid>https://www.tenable.com/plugins/was/114733</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114733 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.2.x < 4.2.4 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.25 / 3.11.x prior to 3.11.18 / 4.0.x prior to 4.0.12 / 4.1.x prior to 4.1.7 / 4.2.x prior to 4.2.4. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- XSS risk when manually running a task in the admin UI<br /></span><span><br /></span><span>- Badge recipients are available to all users<br /></span><span><br /></span><span>- Survey responses did not respect group settings<br /></span><span><br /></span><span>- Logs and Live logs course reports did not respect activity group settings<br /></span><span><br /></span><span>- Authenticated remote code execution risk in course blocks<br /></span><span><br /></span><span>- DOS risk in URL downloader<br /></span><span><br /></span><span>- Authenticated remote code execution risk in logstore as manager<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.2.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114733">https://www.tenable.com/plugins/was/114733</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.1.x < 4.1.7 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114732</link>
            <guid>https://www.tenable.com/plugins/was/114732</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114732 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.1.x < 4.1.7 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.25 / 3.11.x prior to 3.11.18 / 4.0.x prior to 4.0.12 / 4.1.x prior to 4.1.7 / 4.2.x prior to 4.2.4. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- XSS risk when manually running a task in the admin UI<br /></span><span><br /></span><span>- Badge recipients are available to all users<br /></span><span><br /></span><span>- Survey responses did not respect group settings<br /></span><span><br /></span><span>- Logs and Live logs course reports did not respect activity group settings<br /></span><span><br /></span><span>- Authenticated remote code execution risk in course blocks<br /></span><span><br /></span><span>- DOS risk in URL downloader<br /></span><span><br /></span><span>- Authenticated remote code execution risk in logstore as manager<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.1.7 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114732">https://www.tenable.com/plugins/was/114732</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.0.x < 4.0.12 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114731</link>
            <guid>https://www.tenable.com/plugins/was/114731</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114731 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.0.x < 4.0.12 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.25 / 3.11.x prior to 3.11.18 / 4.0.x prior to 4.0.12 / 4.1.x prior to 4.1.7 / 4.2.x prior to 4.2.4. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- XSS risk when manually running a task in the admin UI<br /></span><span><br /></span><span>- Badge recipients are available to all users<br /></span><span><br /></span><span>- Survey responses did not respect group settings<br /></span><span><br /></span><span>- Logs and Live logs course reports did not respect activity group settings<br /></span><span><br /></span><span>- Authenticated remote code execution risk in course blocks<br /></span><span><br /></span><span>- DOS risk in URL downloader<br /></span><span><br /></span><span>- Authenticated remote code execution risk in logstore as manager<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.0.12 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114731">https://www.tenable.com/plugins/was/114731</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 3.11.x < 3.11.18 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114730</link>
            <guid>https://www.tenable.com/plugins/was/114730</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114730 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 3.11.x < 3.11.18 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.25 / 3.11.x prior to 3.11.18 / 4.0.x prior to 4.0.12 / 4.1.x prior to 4.1.7 / 4.2.x prior to 4.2.4. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- XSS risk when manually running a task in the admin UI<br /></span><span><br /></span><span>- Badge recipients are available to all users<br /></span><span><br /></span><span>- Survey responses did not respect group settings<br /></span><span><br /></span><span>- Logs and Live logs course reports did not respect activity group settings<br /></span><span><br /></span><span>- Authenticated remote code execution risk in course blocks<br /></span><span><br /></span><span>- DOS risk in URL downloader<br /></span><span><br /></span><span>- Authenticated remote code execution risk in logstore as manager<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 3.11.18 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114730">https://www.tenable.com/plugins/was/114730</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle < 3.9.25 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114729</link>
            <guid>https://www.tenable.com/plugins/was/114729</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114729 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle < 3.9.25 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.25 / 3.11.x prior to 3.11.18 / 4.0.x prior to 4.0.12 / 4.1.x prior to 4.1.7 / 4.2.x prior to 4.2.4. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- XSS risk when manually running a task in the admin UI<br /></span><span><br /></span><span>- Badge recipients are available to all users<br /></span><span><br /></span><span>- Survey responses did not respect group settings<br /></span><span><br /></span><span>- Logs and Live logs course reports did not respect activity group settings<br /></span><span><br /></span><span>- Authenticated remote code execution risk in course blocks<br /></span><span><br /></span><span>- DOS risk in URL downloader<br /></span><span><br /></span><span>- Authenticated remote code execution risk in logstore as manager<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 3.9.25 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114729">https://www.tenable.com/plugins/was/114729</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.3.x < 4.3.3 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114728</link>
            <guid>https://www.tenable.com/plugins/was/114728</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114728 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.3.x < 4.3.3 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 4.1.10, or 4.2.x prior to 4.2.7 or 4.3.x prior to 4.3.3. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- Actions in the admin management of analytics models did not include the necessary token to prevent a CSRF risk.<br /></span><span><br /></span><span>- The site log report required additional encoding of event descriptions to ensure any HTML in the content is displayed in plaintext instead of being rendered.<br /></span><span><br /></span><span>- In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore database activity modules and direct access to the web server outside of the Moodle webroot could execute a local file include.<br /></span><span><br /></span><span>- In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore wiki modules and direct access to the web server outside of the Moodle webroot could execute a local file include.<br /></span><span><br /></span><span>- In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore workshop modules and direct access to the web server outside of the Moodle webroot could execute a local file include.<br /></span><span><br /></span><span>- In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore feedback modules and direct access to the web server outside of the Moodle webroot could execute a local file include.<br /></span><span><br /></span><span>- Actions in the admin preset tool did not include the necessary token to prevent a CSRF risk.<br /></span><span><br /></span><span>- ID numbers displayed in the lesson overview report required additional sanitizing to prevent a stored XSS risk.<br /></span><span><br /></span><span>- Insufficient escaping of participants' names in the participants page table resulted in a stored XSS risk when interacting with some features.<br /></span><span><br /></span><span>- Additional sanitizing was required when opening the equation editor, to prevent a stored XSS risk when editing another user's equation.<br /></span><span><br /></span><span>- Incorrect validation of allowed event types in a calendar web service made it possible for some users to create events with types/audiences they did not have permission to publish to.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.3.3 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114728">https://www.tenable.com/plugins/was/114728</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.2.x < 4.2.7 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114727</link>
            <guid>https://www.tenable.com/plugins/was/114727</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114727 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.2.x < 4.2.7 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 4.1.10, or 4.2.x prior to 4.2.7 or 4.3.x prior to 4.3.3. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- Actions in the admin management of analytics models did not include the necessary token to prevent a CSRF risk.<br /></span><span><br /></span><span>- The site log report required additional encoding of event descriptions to ensure any HTML in the content is displayed in plaintext instead of being rendered.<br /></span><span><br /></span><span>- In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore database activity modules and direct access to the web server outside of the Moodle webroot could execute a local file include.<br /></span><span><br /></span><span>- In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore wiki modules and direct access to the web server outside of the Moodle webroot could execute a local file include.<br /></span><span><br /></span><span>- In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore workshop modules and direct access to the web server outside of the Moodle webroot could execute a local file include.<br /></span><span><br /></span><span>- In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore feedback modules and direct access to the web server outside of the Moodle webroot could execute a local file include.<br /></span><span><br /></span><span>- Actions in the admin preset tool did not include the necessary token to prevent a CSRF risk.<br /></span><span><br /></span><span>- ID numbers displayed in the lesson overview report required additional sanitizing to prevent a stored XSS risk.<br /></span><span><br /></span><span>- Insufficient escaping of participants' names in the participants page table resulted in a stored XSS risk when interacting with some features.<br /></span><span><br /></span><span>- Additional sanitizing was required when opening the equation editor, to prevent a stored XSS risk when editing another user's equation.<br /></span><span><br /></span><span>- Incorrect validation of allowed event types in a calendar web service made it possible for some users to create events with types/audiences they did not have permission to publish to.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.2.7 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114727">https://www.tenable.com/plugins/was/114727</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle < 4.1.10 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114726</link>
            <guid>https://www.tenable.com/plugins/was/114726</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114726 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle < 4.1.10 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 4.1.10, or 4.2.x prior to 4.2.7 or 4.3.x prior to 4.3.3. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- Actions in the admin management of analytics models did not include the necessary token to prevent a CSRF risk.<br /></span><span><br /></span><span>- The site log report required additional encoding of event descriptions to ensure any HTML in the content is displayed in plaintext instead of being rendered.<br /></span><span><br /></span><span>- In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore database activity modules and direct access to the web server outside of the Moodle webroot could execute a local file include.<br /></span><span><br /></span><span>- In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore wiki modules and direct access to the web server outside of the Moodle webroot could execute a local file include.<br /></span><span><br /></span><span>- In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore workshop modules and direct access to the web server outside of the Moodle webroot could execute a local file include.<br /></span><span><br /></span><span>- In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore feedback modules and direct access to the web server outside of the Moodle webroot could execute a local file include.<br /></span><span><br /></span><span>- Actions in the admin preset tool did not include the necessary token to prevent a CSRF risk.<br /></span><span><br /></span><span>- ID numbers displayed in the lesson overview report required additional sanitizing to prevent a stored XSS risk.<br /></span><span><br /></span><span>- Insufficient escaping of participants' names in the participants page table resulted in a stored XSS risk when interacting with some features.<br /></span><span><br /></span><span>- Additional sanitizing was required when opening the equation editor, to prevent a stored XSS risk when editing another user's equation.<br /></span><span><br /></span><span>- Incorrect validation of allowed event types in a calendar web service made it possible for some users to create events with types/audiences they did not have permission to publish to.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.1.10 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114726">https://www.tenable.com/plugins/was/114726</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.3.x < 4.3.4 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114725</link>
            <guid>https://www.tenable.com/plugins/was/114725</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114725 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.3.x < 4.3.4 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.3.x prior to 4.3.4. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- Insufficient checks whether ReCAPTCHA was enabled made it possible to bypass the checks on the login page. This did not affect other pages where ReCAPTCHA is utilised.<br /></span><span><br /></span><span>- The logout option within MFA did not include the necessary token to avoid the risk of users inadvertently being logged out via CSRF.<br /></span><span><br /></span><span>- The referrer URL used by MFA required additional sanitizing, rather than being used directly.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.3.4 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114725">https://www.tenable.com/plugins/was/114725</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.4.x < 4.4.1 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114724</link>
            <guid>https://www.tenable.com/plugins/was/114724</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114724 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.4.x < 4.4.1 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 4.1.11, 4.2.x prior to 4.2.8, or 4.3.x prior to 4.3.5 or 4.4.x prior to 4.4.1. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- A unique key should be generated for a user's QR login key and their auto-login key, so the same key cannot be used interchangeably between the two.<br /></span><span><br /></span><span>- Incorrect CSRF token checks resulted in multiple CSRF risks.<br /></span><span><br /></span><span>- The cURL wrapper in Moodle retained the original request headers when following redirects, so HTTP authorization header information could be unintentionally sent in requests to redirect URLs.<br /></span><span><br /></span><span>- Insufficient escaping of calendar event titles resulted in a stored XSS risk in the event deletion prompt.<br /></span><span><br /></span><span>- Insufficient capability checks meant it was possible for users to gain access to BigBlueButton join URLs they did not have permission to access.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.4.1 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114724">https://www.tenable.com/plugins/was/114724</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.3.x < 4.3.5 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114723</link>
            <guid>https://www.tenable.com/plugins/was/114723</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114723 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.3.x < 4.3.5 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 4.1.11, 4.2.x prior to 4.2.8, or 4.3.x prior to 4.3.5 or 4.4.x prior to 4.4.1. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- A unique key should be generated for a user's QR login key and their auto-login key, so the same key cannot be used interchangeably between the two.<br /></span><span><br /></span><span>- Incorrect CSRF token checks resulted in multiple CSRF risks.<br /></span><span><br /></span><span>- The cURL wrapper in Moodle retained the original request headers when following redirects, so HTTP authorization header information could be unintentionally sent in requests to redirect URLs.<br /></span><span><br /></span><span>- Insufficient escaping of calendar event titles resulted in a stored XSS risk in the event deletion prompt.<br /></span><span><br /></span><span>- Insufficient capability checks meant it was possible for users to gain access to BigBlueButton join URLs they did not have permission to access.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.3.5 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114723">https://www.tenable.com/plugins/was/114723</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.2.x < 4.2.8 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114722</link>
            <guid>https://www.tenable.com/plugins/was/114722</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114722 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.2.x < 4.2.8 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 4.1.11, 4.2.x prior to 4.2.8, or 4.3.x prior to 4.3.5 or 4.4.x prior to 4.4.1. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- A unique key should be generated for a user's QR login key and their auto-login key, so the same key cannot be used interchangeably between the two.<br /></span><span><br /></span><span>- Incorrect CSRF token checks resulted in multiple CSRF risks.<br /></span><span><br /></span><span>- The cURL wrapper in Moodle retained the original request headers when following redirects, so HTTP authorization header information could be unintentionally sent in requests to redirect URLs.<br /></span><span><br /></span><span>- Insufficient escaping of calendar event titles resulted in a stored XSS risk in the event deletion prompt.<br /></span><span><br /></span><span>- Insufficient capability checks meant it was possible for users to gain access to BigBlueButton join URLs they did not have permission to access.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.2.8 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114722">https://www.tenable.com/plugins/was/114722</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.4.x < 4.4.5 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114721</link>
            <guid>https://www.tenable.com/plugins/was/114721</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114721 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.4.x < 4.4.5 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.1.x prior to 4.1.15, 4.3.x prior to 4.3.9, or 4.4.x prior to 4.4.5. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- A potential denial of service risk due to guest sessions' longer timeout period.<br /></span><span><br /></span><span>- A database activity issue in separate groups mode, for users not in a group.<br /></span><span><br /></span><span>- An email change confirmation token available via preference.<br /></span><span><br /></span><span>- A tag index page displays other users tagged with the selected tag.<br /></span><span><br /></span><span>- Unprotected access to sensitive information via learning plan web service.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.4.5 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114721">https://www.tenable.com/plugins/was/114721</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.4.x < 4.4.2 Multiples Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114720</link>
            <guid>https://www.tenable.com/plugins/was/114720</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114720 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.4.x < 4.4.2 Multiples Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.4.x prior to 4.4.2. It is, therefore, affected by multiples vulnerabilities :<br /></span><span><br /></span><span>- Matrix user/power level management not always working as expected with suspended users.<br /></span><span><br /></span><span>- Lack of access control when using external methods for Quiz overrides.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.4.2 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114720">https://www.tenable.com/plugins/was/114720</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle < 4.1.12 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114719</link>
            <guid>https://www.tenable.com/plugins/was/114719</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114719 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle < 4.1.12 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.1.x prior to 4.1.12, 4.2.x prior to 4.2.9, 4.3.x prior to 4.3.6, or 4.4.x prior to 4.4.2. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- A LFI vulnerability when restoring malformed block backups.<br /></span><span><br /></span><span>- A reflected XSS via H5P error message.<br /></span><span><br /></span><span>- An IDOR in Feedback non-respondents report allows messaging arbitrary site users.<br /></span><span><br /></span><span>- An XSS risk when restoring malicious course backup file.<br /></span><span><br /></span><span>- A site administration SQL injection via XMLDB editor.<br /></span><span><br /></span><span>- Can create global glossary without being admin.<br /></span><span><br /></span><span>- A CSRF risk in Feedback non-respondents report.<br /></span><span><br /></span><span>- Authorization headers preserved between "emulated redirects".<br /></span><span><br /></span><span>- An IDOR in badges allows deletion of arbitrary badges.<br /></span><span><br /></span><span>- User information visibility control issues in gradebook reports.<br /></span><span><br /></span><span>- Cache poisoning via injection into storage.<br /></span><span><br /></span><span>- Admin presets export tool includes some secrets that should not be exported.<br /></span><span><br /></span><span>- An arbitrary file read risk through pdfTeX.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.1.12 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114719">https://www.tenable.com/plugins/was/114719</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.2.x < 4.2.9 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114718</link>
            <guid>https://www.tenable.com/plugins/was/114718</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114718 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.2.x < 4.2.9 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.1.x prior to 4.1.12, 4.2.x prior to 4.2.9, 4.3.x prior to 4.3.6, or 4.4.x prior to 4.4.2. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- A LFI vulnerability when restoring malformed block backups.<br /></span><span><br /></span><span>- A reflected XSS via H5P error message.<br /></span><span><br /></span><span>- An IDOR in Feedback non-respondents report allows messaging arbitrary site users.<br /></span><span><br /></span><span>- An XSS risk when restoring malicious course backup file.<br /></span><span><br /></span><span>- A site administration SQL injection via XMLDB editor.<br /></span><span><br /></span><span>- Can create global glossary without being admin.<br /></span><span><br /></span><span>- A CSRF risk in Feedback non-respondents report.<br /></span><span><br /></span><span>- Authorization headers preserved between "emulated redirects".<br /></span><span><br /></span><span>- An IDOR in badges allows deletion of arbitrary badges.<br /></span><span><br /></span><span>- User information visibility control issues in gradebook reports.<br /></span><span><br /></span><span>- Cache poisoning via injection into storage.<br /></span><span><br /></span><span>- Admin presets export tool includes some secrets that should not be exported.<br /></span><span><br /></span><span>- An arbitrary file read risk through pdfTeX.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.2.9 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114718">https://www.tenable.com/plugins/was/114718</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.3.x < 4.3.6 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114717</link>
            <guid>https://www.tenable.com/plugins/was/114717</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114717 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.3.x < 4.3.6 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.1.x prior to 4.1.12, 4.2.x prior to 4.2.9, 4.3.x prior to 4.3.6, or 4.4.x prior to 4.4.2. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- A LFI vulnerability when restoring malformed block backups.<br /></span><span><br /></span><span>- A reflected XSS via H5P error message.<br /></span><span><br /></span><span>- An IDOR in Feedback non-respondents report allows messaging arbitrary site users.<br /></span><span><br /></span><span>- An XSS risk when restoring malicious course backup file.<br /></span><span><br /></span><span>- A site administration SQL injection via XMLDB editor.<br /></span><span><br /></span><span>- Can create global glossary without being admin.<br /></span><span><br /></span><span>- A CSRF risk in Feedback non-respondents report.<br /></span><span><br /></span><span>- Authorization headers preserved between "emulated redirects".<br /></span><span><br /></span><span>- An IDOR in badges allows deletion of arbitrary badges.<br /></span><span><br /></span><span>- User information visibility control issues in gradebook reports.<br /></span><span><br /></span><span>- Cache poisoning via injection into storage.<br /></span><span><br /></span><span>- Admin presets export tool includes some secrets that should not be exported.<br /></span><span><br /></span><span>- An arbitrary file read risk through pdfTeX.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.3.6 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114717">https://www.tenable.com/plugins/was/114717</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.4.x < 4.4.2 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114716</link>
            <guid>https://www.tenable.com/plugins/was/114716</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114716 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.4.x < 4.4.2 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.1.x prior to 4.1.12, 4.2.x prior to 4.2.9, 4.3.x prior to 4.3.6, or 4.4.x prior to 4.4.2. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- A LFI vulnerability when restoring malformed block backups.<br /></span><span><br /></span><span>- A reflected XSS via H5P error message.<br /></span><span><br /></span><span>- An IDOR in Feedback non-respondents report allows messaging arbitrary site users.<br /></span><span><br /></span><span>- An XSS risk when restoring malicious course backup file.<br /></span><span><br /></span><span>- A site administration SQL injection via XMLDB editor.<br /></span><span><br /></span><span>- Can create global glossary without being admin.<br /></span><span><br /></span><span>- A CSRF risk in Feedback non-respondents report.<br /></span><span><br /></span><span>- Authorization headers preserved between "emulated redirects".<br /></span><span><br /></span><span>- An IDOR in badges allows deletion of arbitrary badges.<br /></span><span><br /></span><span>- User information visibility control issues in gradebook reports.<br /></span><span><br /></span><span>- Cache poisoning via injection into storage.<br /></span><span><br /></span><span>- Admin presets export tool includes some secrets that should not be exported.<br /></span><span><br /></span><span>- An arbitrary file read risk through pdfTeX.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.4.2 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114716">https://www.tenable.com/plugins/was/114716</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.1.x < 4.1.13 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114715</link>
            <guid>https://www.tenable.com/plugins/was/114715</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114715 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.1.x < 4.1.13 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.1.x prior to 4.1.13, 4.2.x prior to 4.2.10, 4.3.x prior to 4.3.7, or 4.4.x prior to 4.4.3. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- A lesson activity password bypass through PHP loose comparison.<br /></span><span><br /></span><span>- An IDOR when deleting OAuth2 linked accounts.<br /></span><span><br /></span><span>- Unprotected access to sensitive information via dynamic tables.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.1.13 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114715">https://www.tenable.com/plugins/was/114715</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.2.x < 4.2.10 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114714</link>
            <guid>https://www.tenable.com/plugins/was/114714</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114714 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.2.x < 4.2.10 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.1.x prior to 4.1.13, 4.2.x prior to 4.2.10, 4.3.x prior to 4.3.7, or 4.4.x prior to 4.4.3. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- A lesson activity password bypass through PHP loose comparison.<br /></span><span><br /></span><span>- An IDOR when deleting OAuth2 linked accounts.<br /></span><span><br /></span><span>- Unprotected access to sensitive information via dynamic tables.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.2.10 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114714">https://www.tenable.com/plugins/was/114714</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.3.x < 4.3.7 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114713</link>
            <guid>https://www.tenable.com/plugins/was/114713</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114713 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.3.x < 4.3.7 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.1.x prior to 4.1.13, 4.2.x prior to 4.2.10, 4.3.x prior to 4.3.7, or 4.4.x prior to 4.4.3. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- A lesson activity password bypass through PHP loose comparison.<br /></span><span><br /></span><span>- An IDOR when deleting OAuth2 linked accounts.<br /></span><span><br /></span><span>- Unprotected access to sensitive information via dynamic tables.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.3.7 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114713">https://www.tenable.com/plugins/was/114713</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.4.x < 4.4.3 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114712</link>
            <guid>https://www.tenable.com/plugins/was/114712</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114712 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.4.x < 4.4.3 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.1.x prior to 4.1.13, 4.2.x prior to 4.2.10, 4.3.x prior to 4.3.7, or 4.4.x prior to 4.4.3. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- A lesson activity password bypass through PHP loose comparison.<br /></span><span><br /></span><span>- An IDOR when deleting OAuth2 linked accounts.<br /></span><span><br /></span><span>- Unprotected access to sensitive information via dynamic tables.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.4.3 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114712">https://www.tenable.com/plugins/was/114712</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.4.x < 4.4.4 Multiple Insecure Direct Object Reference]]></title>
            <link>https://www.tenable.com/plugins/was/114711</link>
            <guid>https://www.tenable.com/plugins/was/114711</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114711 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.4.x < 4.4.4 Multiple Insecure Direct Object Reference<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.4.x prior to 4.4.4. It is, therefore, affected by multiple insecure direct object reference.<br /></span><span><br /></span><span>- An IDOR when accessing list of badge recipients.<br /></span><span><br /></span><span>- An IDOR when accessing list of course badges.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.4.4 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114711">https://www.tenable.com/plugins/was/114711</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle < 4.1.14 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114710</link>
            <guid>https://www.tenable.com/plugins/was/114710</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114710 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle < 4.1.14 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.1.x prior to 4.1.14, 4.2.x prior to 4.2.11, 4.3.x prior to 4.3.8, or 4.4.x prior to 4.4.4. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- An IDOR when fetching report schedules.<br /></span><span><br /></span><span>- Some users can delete audiences of other reports.<br /></span><span><br /></span><span>- An IDOR in edit/delete RSS feed.<br /></span><span><br /></span><span>- Users' names returned in messaging error message.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.1.14 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114710">https://www.tenable.com/plugins/was/114710</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.2.x < 4.2.11 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114709</link>
            <guid>https://www.tenable.com/plugins/was/114709</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114709 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.2.x < 4.2.11 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.1.x prior to 4.1.14, 4.2.x prior to 4.2.11, 4.3.x prior to 4.3.8, or 4.4.x prior to 4.4.4. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- An IDOR when fetching report schedules.<br /></span><span><br /></span><span>- Some users can delete audiences of other reports.<br /></span><span><br /></span><span>- An IDOR in edit/delete RSS feed.<br /></span><span><br /></span><span>- Users' names returned in messaging error message.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.2.11 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114709">https://www.tenable.com/plugins/was/114709</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.3.x < 4.3.8 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114708</link>
            <guid>https://www.tenable.com/plugins/was/114708</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114708 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.3.x < 4.3.8 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.1.x prior to 4.1.14, 4.2.x prior to 4.2.11, 4.3.x prior to 4.3.8, or 4.4.x prior to 4.4.4. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- An IDOR when fetching report schedules.<br /></span><span><br /></span><span>- Some users can delete audiences of other reports.<br /></span><span><br /></span><span>- An IDOR in edit/delete RSS feed.<br /></span><span><br /></span><span>- Users' names returned in messaging error message.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.3.8 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114708">https://www.tenable.com/plugins/was/114708</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.4.x < 4.4.4 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114707</link>
            <guid>https://www.tenable.com/plugins/was/114707</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114707 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.4.x < 4.4.4 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.1.x prior to 4.1.14, 4.2.x prior to 4.2.11, 4.3.x prior to 4.3.8, or 4.4.x prior to 4.4.4. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- An IDOR when fetching report schedules.<br /></span><span><br /></span><span>- Some users can delete audiences of other reports.<br /></span><span><br /></span><span>- An IDOR in edit/delete RSS feed.<br /></span><span><br /></span><span>- Users' names returned in messaging error message.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.4.4 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114707">https://www.tenable.com/plugins/was/114707</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.5.x < 4.5.1 Reflected XSS In Question Bank Filter]]></title>
            <link>https://www.tenable.com/plugins/was/114706</link>
            <guid>https://www.tenable.com/plugins/was/114706</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114706 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.5.x < 4.5.1 Reflected XSS In Question Bank Filter<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.3.x prior to 4.3.8 or 4.4.4 prior to 4.4.5 or 4.5.x prior to 4.5.1 . It is, therefore, affected by a Reflected XSS in question bank filter.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.5.1 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114706">https://www.tenable.com/plugins/was/114706</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.4.4 < 4.4.5 Reflected XSS In Question Bank Filter]]></title>
            <link>https://www.tenable.com/plugins/was/114705</link>
            <guid>https://www.tenable.com/plugins/was/114705</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114705 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.4.4 < 4.4.5 Reflected XSS In Question Bank Filter<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.3.x prior to 4.3.8 or 4.4.4 prior to 4.4.5 or 4.5.x prior to 4.5.1 . It is, therefore, affected by a Reflected XSS in question bank filter.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.4.5 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114705">https://www.tenable.com/plugins/was/114705</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.3.x < 4.3.8 Reflected XSS In Question Bank Filter]]></title>
            <link>https://www.tenable.com/plugins/was/114704</link>
            <guid>https://www.tenable.com/plugins/was/114704</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114704 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.3.x < 4.3.8 Reflected XSS In Question Bank Filter<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.3.x prior to 4.3.8 or 4.4.4 prior to 4.4.5 or 4.5.x prior to 4.5.1 . It is, therefore, affected by a Reflected XSS in question bank filter.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.3.8 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114704">https://www.tenable.com/plugins/was/114704</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle < 4.1.15 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114703</link>
            <guid>https://www.tenable.com/plugins/was/114703</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114703 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle < 4.1.15 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.1.x prior to 4.1.15, 4.3.x prior to 4.3.9, or 4.4.x prior to 4.4.5. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- A potential denial of service risk due to guest sessions' longer timeout period.<br /></span><span><br /></span><span>- A database activity issue in separate groups mode, for users not in a group.<br /></span><span><br /></span><span>- An email change confirmation token available via preference.<br /></span><span><br /></span><span>- A tag index page displays other users tagged with the selected tag.<br /></span><span><br /></span><span>- Unprotected access to sensitive information via learning plan web service.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.1.15 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114703">https://www.tenable.com/plugins/was/114703</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.3.x < 4.3.9 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114702</link>
            <guid>https://www.tenable.com/plugins/was/114702</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114702 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.3.x < 4.3.9 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is 4.1.x prior to 4.1.15, 4.3.x prior to 4.3.9, or 4.4.x prior to 4.4.5. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- A potential denial of service risk due to guest sessions' longer timeout period.<br /></span><span><br /></span><span>- A database activity issue in separate groups mode, for users not in a group.<br /></span><span><br /></span><span>- An email change confirmation token available via preference.<br /></span><span><br /></span><span>- A tag index page displays other users tagged with the selected tag.<br /></span><span><br /></span><span>- Unprotected access to sensitive information via learning plan web service.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.3.9 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114702">https://www.tenable.com/plugins/was/114702</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.5.x < 4.5.3 Unauthenticated REST API Data Exposure]]></title>
            <link>https://www.tenable.com/plugins/was/114701</link>
            <guid>https://www.tenable.com/plugins/was/114701</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114701 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.5.x < 4.5.3 Unauthenticated REST API Data Exposure<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 4.1.17 or 4.3.x prior to 4.3.11 or 4.4.x prior to 4.4.7 or 4.5.x prior to 4.5.3. It is, therefore, affected by a data exposure through the REST API.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Moodle version 4.5.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114701">https://www.tenable.com/plugins/was/114701</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.1.x < 4.1.16 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114700</link>
            <guid>https://www.tenable.com/plugins/was/114700</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114700 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.1.x < 4.1.16 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 4.1.16 or 4.3.x prior to 4.3.10 or 4.4.x prior to 4.4.6 or 4.5.x prior to 4.5.2. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- An SQL injection risk was identified in the module list filter within course search.<br /></span><span><br /></span><span>- Additional checks were required to ensure trusttext is applied (when enabled) to glossary entries being restored.<br /></span><span><br /></span><span>- Insufficient capability checks made it possible to disable badges a user does not have permission to access.<br /></span><span><br /></span><span>- The upstream RequireJS library was upgraded, which included a security fix.<br /></span><span><br /></span><span>- The question bank filter required additional sanitizing to prevent a reflected XSS risk.<br /></span><span><br /></span><span>- Description information displayed in the site administration live log required additional sanitizing to prevent a stored XSS risk.<br /></span><span><br /></span><span>- The drag-and-drop onto image (ddimageortext) question type required additional sanitizing to prevent a stored XSS risk.<br /></span><span><br /></span><span>- Tags not expected to be visible to a user could still be discovered by them via the tag search page or in the tags block.<br /></span><span><br /></span><span>- Separate Groups mode restrictions were not factored into permission checks before allowing viewing or deletion of responses in Feedback activities.<br /></span><span><br /></span><span>- Insufficient sanitizing in the TeX notation filter resulted in an arbitrary file read risk on sites where pdfTeX is available (such as those with TeX Live installed).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Moodle version 4.1.16 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114700">https://www.tenable.com/plugins/was/114700</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.3.x < 4.3.10 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114699</link>
            <guid>https://www.tenable.com/plugins/was/114699</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114699 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.3.x < 4.3.10 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 4.1.16 or 4.3.x prior to 4.3.10 or 4.4.x prior to 4.4.6 or 4.5.x prior to 4.5.2. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- An SQL injection risk was identified in the module list filter within course search.<br /></span><span><br /></span><span>- Additional checks were required to ensure trusttext is applied (when enabled) to glossary entries being restored.<br /></span><span><br /></span><span>- Insufficient capability checks made it possible to disable badges a user does not have permission to access.<br /></span><span><br /></span><span>- The upstream RequireJS library was upgraded, which included a security fix.<br /></span><span><br /></span><span>- The question bank filter required additional sanitizing to prevent a reflected XSS risk.<br /></span><span><br /></span><span>- Description information displayed in the site administration live log required additional sanitizing to prevent a stored XSS risk.<br /></span><span><br /></span><span>- The drag-and-drop onto image (ddimageortext) question type required additional sanitizing to prevent a stored XSS risk.<br /></span><span><br /></span><span>- Tags not expected to be visible to a user could still be discovered by them via the tag search page or in the tags block.<br /></span><span><br /></span><span>- Separate Groups mode restrictions were not factored into permission checks before allowing viewing or deletion of responses in Feedback activities.<br /></span><span><br /></span><span>- Insufficient sanitizing in the TeX notation filter resulted in an arbitrary file read risk on sites where pdfTeX is available (such as those with TeX Live installed).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Moodle version 4.3.10 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114699">https://www.tenable.com/plugins/was/114699</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.4.x < 4.4.6 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114698</link>
            <guid>https://www.tenable.com/plugins/was/114698</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114698 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.4.x < 4.4.6 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 4.1.16 or 4.3.x prior to 4.3.10 or 4.4.x prior to 4.4.6 or 4.5.x prior to 4.5.2. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- An SQL injection risk was identified in the module list filter within course search.<br /></span><span><br /></span><span>- Additional checks were required to ensure trusttext is applied (when enabled) to glossary entries being restored.<br /></span><span><br /></span><span>- Insufficient capability checks made it possible to disable badges a user does not have permission to access.<br /></span><span><br /></span><span>- The upstream RequireJS library was upgraded, which included a security fix.<br /></span><span><br /></span><span>- The question bank filter required additional sanitizing to prevent a reflected XSS risk.<br /></span><span><br /></span><span>- Description information displayed in the site administration live log required additional sanitizing to prevent a stored XSS risk.<br /></span><span><br /></span><span>- The drag-and-drop onto image (ddimageortext) question type required additional sanitizing to prevent a stored XSS risk.<br /></span><span><br /></span><span>- Tags not expected to be visible to a user could still be discovered by them via the tag search page or in the tags block.<br /></span><span><br /></span><span>- Separate Groups mode restrictions were not factored into permission checks before allowing viewing or deletion of responses in Feedback activities.<br /></span><span><br /></span><span>- Insufficient sanitizing in the TeX notation filter resulted in an arbitrary file read risk on sites where pdfTeX is available (such as those with TeX Live installed).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Moodle version 4.4.6 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114698">https://www.tenable.com/plugins/was/114698</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.5.x < 4.5.2 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114697</link>
            <guid>https://www.tenable.com/plugins/was/114697</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114697 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.5.x < 4.5.2 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 4.1.16 or 4.3.x prior to 4.3.10 or 4.4.x prior to 4.4.6 or 4.5.x prior to 4.5.2. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- An SQL injection risk was identified in the module list filter within course search.<br /></span><span><br /></span><span>- Additional checks were required to ensure trusttext is applied (when enabled) to glossary entries being restored.<br /></span><span><br /></span><span>- Insufficient capability checks made it possible to disable badges a user does not have permission to access.<br /></span><span><br /></span><span>- The upstream RequireJS library was upgraded, which included a security fix.<br /></span><span><br /></span><span>- The question bank filter required additional sanitizing to prevent a reflected XSS risk.<br /></span><span><br /></span><span>- Description information displayed in the site administration live log required additional sanitizing to prevent a stored XSS risk.<br /></span><span><br /></span><span>- The drag-and-drop onto image (ddimageortext) question type required additional sanitizing to prevent a stored XSS risk.<br /></span><span><br /></span><span>- Tags not expected to be visible to a user could still be discovered by them via the tag search page or in the tags block.<br /></span><span><br /></span><span>- Separate Groups mode restrictions were not factored into permission checks before allowing viewing or deletion of responses in Feedback activities.<br /></span><span><br /></span><span>- Insufficient sanitizing in the TeX notation filter resulted in an arbitrary file read risk on sites where pdfTeX is available (such as those with TeX Live installed).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Moodle version 4.5.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114697">https://www.tenable.com/plugins/was/114697</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.1.x < 4.1.17 Hidden Grades Shown Without Permission]]></title>
            <link>https://www.tenable.com/plugins/was/114696</link>
            <guid>https://www.tenable.com/plugins/was/114696</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114696 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.1.x < 4.1.17 Hidden Grades Shown Without Permission<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 4.1.17 or 4.3.x prior to 4.3.11 or 4.4.x prior to 4.4.7 or 4.5.x prior to 4.5.3. It is, therefore, affected by an insufficient capability checks in some grade reports resulted in some hidden grades being available to users who did not have permission to view them.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Moodle version 4.1.17 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114696">https://www.tenable.com/plugins/was/114696</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.3.x < 4.3.11 Hidden Grades Shown Without Permission]]></title>
            <link>https://www.tenable.com/plugins/was/114695</link>
            <guid>https://www.tenable.com/plugins/was/114695</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114695 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.3.x < 4.3.11 Hidden Grades Shown Without Permission<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 4.1.17 or 4.3.x prior to 4.3.11 or 4.4.x prior to 4.4.7 or 4.5.x prior to 4.5.3. It is, therefore, affected by an insufficient capability checks in some grade reports resulted in some hidden grades being available to users who did not have permission to view them.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Moodle version 4.3.11 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114695">https://www.tenable.com/plugins/was/114695</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.4.x < 4.4.7 Hidden Grades Shown Without Permission]]></title>
            <link>https://www.tenable.com/plugins/was/114694</link>
            <guid>https://www.tenable.com/plugins/was/114694</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114694 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.4.x < 4.4.7 Hidden Grades Shown Without Permission<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 4.1.17 or 4.3.x prior to 4.3.11 or 4.4.x prior to 4.4.7 or 4.5.x prior to 4.5.3. It is, therefore, affected by an insufficient capability checks in some grade reports resulted in some hidden grades being available to users who did not have permission to view them.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Moodle version 4.4.7 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114694">https://www.tenable.com/plugins/was/114694</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.5.x < 4.5.3 Hidden Grades Shown Without Permission]]></title>
            <link>https://www.tenable.com/plugins/was/114693</link>
            <guid>https://www.tenable.com/plugins/was/114693</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114693 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.5.x < 4.5.3 Hidden Grades Shown Without Permission<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 4.1.17 or 4.3.x prior to 4.3.11 or 4.4.x prior to 4.4.7 or 4.5.x prior to 4.5.3. It is, therefore, affected by an insufficient capability checks in some grade reports resulted in some hidden grades being available to users who did not have permission to view them.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Moodle version 4.5.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114693">https://www.tenable.com/plugins/was/114693</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.1.x < 4.1.11 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114692</link>
            <guid>https://www.tenable.com/plugins/was/114692</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114692 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.1.x < 4.1.11 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 4.1.11, 4.2.x prior to 4.2.8, or 4.3.x prior to 4.3.5 or 4.4.x prior to 4.4.1. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- A unique key should be generated for a user's QR login key and their auto-login key, so the same key cannot be used interchangeably between the two.<br /></span><span><br /></span><span>- Incorrect CSRF token checks resulted in multiple CSRF risks.<br /></span><span><br /></span><span>- The cURL wrapper in Moodle retained the original request headers when following redirects, so HTTP authorization header information could be unintentionally sent in requests to redirect URLs.<br /></span><span><br /></span><span>- Insufficient escaping of calendar event titles resulted in a stored XSS risk in the event deletion prompt.<br /></span><span><br /></span><span>- Insufficient capability checks meant it was possible for users to gain access to BigBlueButton join URLs they did not have permission to access.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Moodle version 4.1.11 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114692">https://www.tenable.com/plugins/was/114692</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Kubernetes Ingress NGINX Controller Arbitrary Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114691</link>
            <guid>https://www.tenable.com/plugins/was/114691</guid>
            <pubDate>Fri, 04 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114691 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Kubernetes Ingress NGINX Controller Arbitrary Code Execution<br /></span>
      <h3>Description</h3>
      <span>Ingress NGINX Controller for Kubernetes versions before 1.11.5, and 1.12.x before 1.12.1 suffer from a critical remote code execution vulnerability. Successful exploitation allows an unauthenticated attacker with access to the pod network to achieve remote code execution (RCE) in the controller's context, potentially leading to disclosure of all cluster-wide secrets and cluster takeover.<br /></span><span><br /></span><span>Note that this plugin requires the 'File Upload' assessment option enabled in the scan configuration.<br /></span>
      <h3>Solution</h3>
      <span>Do not expose NGINX admission controller and upgrade to version 1.11.5, 1.12.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114691">https://www.tenable.com/plugins/was/114691</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat Path Equivalence Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114690</link>
            <guid>https://www.tenable.com/plugins/was/114690</guid>
            <pubDate>Fri, 04 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114690 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat Path Equivalence Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>A Path Equivalence vulnerability in Apache Tomcat's Default Servlet affects versions 11.0.0-M1 through 11.0.2, 10.1.0-M1 through 10.1.34, and 9.0.0.M1 through 9.0.98. Under specific, non-default configurations involving enabled writes and partial PUT support, attackers could achieve remote code execution, information disclosure, or inject malicious content into uploaded file.<br /></span><span><br /></span><span>Note that this plugin requires the 'File Upload' assessment option enabled in the scan configuration.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade Apache Tomcat to version 11.0.3, 10.1.35, 9.0.99 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114690">https://www.tenable.com/plugins/was/114690</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ivanti EPM Credentials Coercion]]></title>
            <link>https://www.tenable.com/plugins/was/114689</link>
            <guid>https://www.tenable.com/plugins/was/114689</guid>
            <pubDate>Thu, 03 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114689 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Ivanti EPM Credentials Coercion<br /></span>
      <h3>Description</h3>
      <span>Ivanti Endpoint Manager (EPM) versions before the 2024 January-2025 Security Update and 2022 SU6 Juanuary-2025 Security Update suffer from an absolute path traversal vulnerability, allowing a remonte and unauthenticatd attack to leak sensitive information.<br /></span>
      <h3>Solution</h3>
      <span>Apply the January-2025 Security Update or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114689">https://www.tenable.com/plugins/was/114689</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Webmin < 2.301 Network Traffic Loop Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/was/114688</link>
            <guid>https://www.tenable.com/plugins/was/114688</guid>
            <pubDate>Wed, 02 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114688 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Webmin < 2.301 Network Traffic Loop Vulnerability<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Webmin install hosted on the remote host is prior to 2.301. It is, therefore, affected by a vulnerability that allows a network traffic loop via spoofed UDP packets on port 10000 (CVE-2024-45692).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Webmin version 2.301 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114688">https://www.tenable.com/plugins/was/114688</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Webmin < 2.110 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114687</link>
            <guid>https://www.tenable.com/plugins/was/114687</guid>
            <pubDate>Wed, 02 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114687 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Webmin < 2.110 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Webmin install hosted on the remote host is prior to 2.110. It is, therefore, affected by a Cross Site Scripting (XSS) vulnerability in the 'Execute cron job as' tab Input field (CVE-2023-52046).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Webmin version 2.110 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114687">https://www.tenable.com/plugins/was/114687</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Webmin < 2.101 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114686</link>
            <guid>https://www.tenable.com/plugins/was/114686</guid>
            <pubDate>Wed, 02 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114686 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Webmin < 2.101 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Webmin install hosted on the remote host is prior to 2.101. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- A Reflected Cross-Site Scripting (XSS) vulnerability exists in the File Manager function.<br /></span><span><br /></span><span>- A Cross-Site Scripting (XSS) vulnerability exists in the File Manager functionality.<br /></span><span><br /></span><span>- A Stored Cross-Site Scripting (XSS) vulnerability exists in the Usermin Configuration function.<br /></span><span><br /></span><span>- A Stored Cross-Site Scripting (XSS) vulnerability exists in the cloned module name parameter<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Webmin version 2.101 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114686">https://www.tenable.com/plugins/was/114686</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Webmin < 2.100 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114685</link>
            <guid>https://www.tenable.com/plugins/was/114685</guid>
            <pubDate>Wed, 02 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114685 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Webmin < 2.100 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Webmin install hosted on the remote host is prior to 2.100. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- A Cross-Site Scripting (XSS) vulnerability exists in the Users Real name parameter.<br /></span><span><br /></span><span>- A Cross-Site Scripting (XSS) vulnerability exists in the Group Name field.<br /></span><span><br /></span><span>- A Cross-Site Scripting (XSS) vulnerability exists in the download functionality via crafted path.<br /></span><span><br /></span><span>- A Cross-Site Scripting (XSS) Bypass vulnerability exists in the file upload functionality.<br /></span><span><br /></span><span>- A Cross-Site Scripting (XSS) vulnerability exists in the Users and Groups functionality when deleting a user.<br /></span><span><br /></span><span>- A Cross-Site Scripting (XSS) vulnerability exists in the HTTP Tunnel functionality via third-party URL.<br /></span><span><br /></span><span>- A Reflected Cross-Site Scripting (XSS) vulnerability exists in the package search functionality.<br /></span><span><br /></span><span>- A Stored Cross-Site Scripting (XSS) vulnerability exists in the Configuration settings of the system logs functionality.<br /></span><span><br /></span><span>- A Stored Cross-Site Scripting (XSS) vulnerability exists in the System Logs Viewer functionality.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Webmin version 2.100 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114685">https://www.tenable.com/plugins/was/114685</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[CrushFTP 10.x < 10.8.3 / 11.x < 11.3.0 Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114684</link>
            <guid>https://www.tenable.com/plugins/was/114684</guid>
            <pubDate>Wed, 02 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114684 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>CrushFTP 10.x < 10.8.3 / 11.x < 11.3.0 Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>CrushFTP versions 10.x before 10.8.3 and 11.x before 11.3.0 are vulnerable to an authentication bypass vulnerability, allowing a remote and unauthenticated user to gain access to the target CrushFTP instance.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to CrushFTP version 10.8.3 or 11.3.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114684">https://www.tenable.com/plugins/was/114684</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Next.js 15.x < 15.2.3 Authorization Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114683</link>
            <guid>https://www.tenable.com/plugins/was/114683</guid>
            <pubDate>Mon, 24 Mar 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114683 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Next.js 15.x < 15.2.3 Authorization Bypass<br /></span>
      <h3>Description</h3>
      <span>The version of Next.js installed on the remote host is 11.1.4 prior to 12.3.5, 13.0.x prior to 13.5.9, 14.x prior to 14.2.25 or 15.x prior to 15.2.3. It is, therefore, affected by Authorization Bypass if the authorization check occurs in middleware.<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit this issue but has instead relied only on application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Next.js version 15.2.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114683">https://www.tenable.com/plugins/was/114683</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Next.js 14.x < 14.2.25 Authorization Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114682</link>
            <guid>https://www.tenable.com/plugins/was/114682</guid>
            <pubDate>Mon, 24 Mar 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114682 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Next.js 14.x < 14.2.25 Authorization Bypass<br /></span>
      <h3>Description</h3>
      <span>The version of Next.js installed on the remote host is 11.1.4 prior to 12.3.5, 13.0.x prior to 13.5.9, 14.x prior to 14.2.25 or 15.x prior to 15.2.3. It is, therefore, affected by Authorization Bypass if the authorization check occurs in middleware.<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit this issue but has instead relied only on application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Next.js version 14.2.25 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114682">https://www.tenable.com/plugins/was/114682</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Next.js 13.0.x < 13.5.9 Authorization Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114681</link>
            <guid>https://www.tenable.com/plugins/was/114681</guid>
            <pubDate>Mon, 24 Mar 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114681 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Next.js 13.0.x < 13.5.9 Authorization Bypass<br /></span>
      <h3>Description</h3>
      <span>The version of Next.js installed on the remote host is 11.1.4 prior to 12.3.5, 13.0.x prior to 13.5.9, 14.x prior to 14.2.25 or 15.x prior to 15.2.3. It is, therefore, affected by Authorization Bypass if the authorization check occurs in middleware.<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit this issue but has instead relied only on application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Next.js version 13.5.9 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114681">https://www.tenable.com/plugins/was/114681</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Age Gates Plugin for WordPress < 3.5.4 Local File Inclusion]]></title>
            <link>https://www.tenable.com/plugins/was/114680</link>
            <guid>https://www.tenable.com/plugins/was/114680</guid>
            <pubDate>Mon, 24 Mar 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114680 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Age Gates Plugin for WordPress < 3.5.4 Local File Inclusion<br /></span>
      <h3>Description</h3>
      <span>The WordPress Age Gate Plugin installed on the remote host is affected by a Local File Inclusion.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Age Gates for Woocommerce Plugin for WordPress 3.5.4<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114680">https://www.tenable.com/plugins/was/114680</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Drupal 8.0.x < 10.3.14 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114679</link>
            <guid>https://www.tenable.com/plugins/was/114679</guid>
            <pubDate>Mon, 24 Mar 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114679 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Drupal 8.0.x < 10.3.14 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the instance of Drupal running on the remote web server is 11.1.x prior to 11.1.5, 11.0.x prior to 11.0.13, 10.4.x prior to 10.4.5 or 8.x prior to 10.3.14. Drupal core Link field attributes are not sufficiently sanitized, which can lead to a Cross-Site Scripting vulnerability (XSS).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Drupal version 10.3.14 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114679">https://www.tenable.com/plugins/was/114679</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Drupal 10.4.x < 10.4.5 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114678</link>
            <guid>https://www.tenable.com/plugins/was/114678</guid>
            <pubDate>Mon, 24 Mar 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114678 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Drupal 10.4.x < 10.4.5 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the instance of Drupal running on the remote web server is 11.1.x prior to 11.1.5, 11.0.x prior to 11.0.13, 10.4.x prior to 10.4.5 or 8.x prior to 10.3.14. Drupal core Link field attributes are not sufficiently sanitized, which can lead to a Cross-Site Scripting vulnerability (XSS).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Drupal version 10.4.5 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114678">https://www.tenable.com/plugins/was/114678</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Drupal 11.0.x < 11.0.13 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114677</link>
            <guid>https://www.tenable.com/plugins/was/114677</guid>
            <pubDate>Mon, 24 Mar 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114677 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Drupal 11.0.x < 11.0.13 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the instance of Drupal running on the remote web server is 11.1.x prior to 11.1.5, 11.0.x prior to 11.0.13, 10.4.x prior to 10.4.5 or 8.x prior to 10.3.14. Drupal core Link field attributes are not sufficiently sanitized, which can lead to a Cross-Site Scripting vulnerability (XSS).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Drupal version 11.0.13 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114677">https://www.tenable.com/plugins/was/114677</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Drupal 11.1.x < 11.1.5 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114676</link>
            <guid>https://www.tenable.com/plugins/was/114676</guid>
            <pubDate>Mon, 24 Mar 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114676 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Drupal 11.1.x < 11.1.5 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the instance of Drupal running on the remote web server is 11.1.x prior to 11.1.5, 11.0.x prior to 11.0.13, 10.4.x prior to 10.4.5 or 8.x prior to 10.3.14. Drupal core Link field attributes are not sufficiently sanitized, which can lead to a Cross-Site Scripting vulnerability (XSS).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Drupal version 11.1.5 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114676">https://www.tenable.com/plugins/was/114676</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[ServiceNow Public Knowledge Base Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114675</link>
            <guid>https://www.tenable.com/plugins/was/114675</guid>
            <pubDate>Mon, 24 Mar 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114675 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>ServiceNow Public Knowledge Base Detected<br /></span>
      <h3>Description</h3>
      <span>ServiceNow offers a knowledge management module to help organizations sharing internal or public information to help in their service usages. This informational plugin detects the presence of public knowledge bases on the target ServiceNow instance.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that it is expected to have public knowledge bases enabled on the target instance.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114675">https://www.tenable.com/plugins/was/114675</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[ServiceNow SAML Single Sign-On Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114674</link>
            <guid>https://www.tenable.com/plugins/was/114674</guid>
            <pubDate>Mon, 24 Mar 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114674 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>ServiceNow SAML Single Sign-On Bypass<br /></span>
      <h3>Description</h3>
      <span>ServiceNow enables a page named `side_door.do` by default to allow users bypassing the Single Sign On (SSO) feature in case of issues to still access their ServiceNow instance.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the recommendations applied by ServiceNow are properly enforced to avoid authentication trough this side door page with weak credentials.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114674">https://www.tenable.com/plugins/was/114674</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[JFrog Artifactory Anonymous Deployment Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114669</link>
            <guid>https://www.tenable.com/plugins/was/114669</guid>
            <pubDate>Mon, 24 Mar 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114669 with High Severity</p>
      <h3>Synopsis</h3>
      <span>JFrog Artifactory Anonymous Deployment Detected<br /></span>
      <h3>Description</h3>
      <span>JFrog Artifactory can be misconfigured and allows an unauthenticated attacker to deploy files to certain repositories. By simply querying the repodata endpoint, the attacker can identify whuch repositories permit anonymous deployment.<br /></span>
      <h3>Solution</h3>
      <span>Modify JFrog Artifactory configuration to restrict anonymous access.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114669">https://www.tenable.com/plugins/was/114669</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[PHP 8.1.x < 8.1.32 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114673</link>
            <guid>https://www.tenable.com/plugins/was/114673</guid>
            <pubDate>Tue, 18 Mar 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114673 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>PHP 8.1.x < 8.1.32 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the version of PHP installed on the remote host is 8.1.x prior to 8.1.32, 8.2.x prior to 8.2.28, 8.3.x prior to 8.3.19, or 8.4.x prior to 8.4.5. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span> - libxml streams use wrong content-type header when requesting a redirected resource. (CVE-2025-1219)<br /></span><span><br /></span><span> - Stream HTTP wrapper header check might omit basic auth header. (CVE-2025-1736)<br /></span><span><br /></span><span> - Stream HTTP wrapper truncate redirect location to 1024 bytes. (CVE-2025-1861)<br /></span><span><br /></span><span> - Streams HTTP wrapper does not fail for headers without colon. (CVE-2025-1734)<br /></span><span><br /></span><span> - Header parser of `http` stream wrapper does not handle folded headers. (CVE-2025-1217)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to PHP version 8.1.32 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114673">https://www.tenable.com/plugins/was/114673</a></p>
    ]]></description>
        </item>
    </channel>
</rss>