Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-58156
PUBLISHED
More InfoOfficial Page
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
View Known Exploited Vulnerability (KEV) details
Published At-29 Aug, 2025 | 21:40
Updated At-29 Aug, 2025 | 21:40
Rejected At-
▼CVE Numbering Authority (CNA)
Centurion ERP users can view hashed authentication tokens that belong to other users

Centurion ERP is an ERP with a focus on ITSM and automation. In versions starting from 1.12.0 to before 1.21.0, an authenticated user can view all authentication token details within the database. This includes the actual token, although only the hashed token. This does not include any un-hashed authentication token as viewable. This issue has been patched in version 1.21.0. A workaround for this is not deemed viable as it would involve disabling token authentication. Users are encouraged to remove any authentication token that was created by one of the effected versions of Centurion ERP. Webmasters can ensure this occurs by removing all authentication tokens from the database.

Affected Products
Vendor
nofusscomputing
Product
centurion_erp
Versions
Affected
  • >= 1.12.0, < 1.21.0
Problem Types
TypeCWE IDDescription
CWECWE-285CWE-285: Improper Authorization
Metrics
VersionBase scoreBase severityVector
3.11.9LOW
CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/nofusscomputing/centurion_erp/security/advisories/GHSA-x75j-cm35-5qcg
x_refsource_CONFIRM
https://github.com/nofusscomputing/centurion_erp/pull/974
x_refsource_MISC
https://github.com/nofusscomputing/centurion_erp/commit/332eb1075ad828e5c4c24caeaf5605259eb7ce34
x_refsource_MISC
Details not found