CVE-2025-8530

A vulnerability, which was classified as problematic, has been found in elunez eladmin up to 2.7. Affected by this issue is some unknown functionality of the file eladmin-system\src\main\resources\config\application-prod.yml of the component Druid. The manipulation of the argument login-username/login-password leads to use of default credentials. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/elunez/eladmin/issues/883 Exploit Issue Tracking
https://github.com/elunez/eladmin/issues/883#issue-3252078139 Exploit Issue Tracking
https://vuldb.com/?ctiid.318656 Permissions Required VDB Entry
https://vuldb.com/?id.318656 Third Party Advisory VDB Entry
https://vuldb.com/?submit.622177 Third Party Advisory VDB Entry
https://github.com/elunez/eladmin/issues/883 Exploit Issue Tracking
https://github.com/elunez/eladmin/issues/883#issue-3252078139 Exploit Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:eladmin:eladmin:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-08-04 23:15

Updated : 2025-09-12 16:09


NVD link : CVE-2025-8530

Mitre link : CVE-2025-8530

CVE.ORG link : CVE-2025-8530


JSON object : View

Products Affected

eladmin

  • eladmin
CWE
CWE-1392

Use of Default Credentials

CWE-798

Use of Hard-coded Credentials