A vulnerability exists in QuickCMS version 6.8 where sensitive admin credentials are hardcoded in a configuration file and stored in plaintext. This flaw allows attackers with access to the source code or the server file system to retrieve authentication details, potentially leading to privilege escalation.
The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.8 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
References
| Link | Resource |
|---|---|
| https://cert.pl/posts/2025/11/CVE-2025-9982 | Third Party Advisory |
| https://opensolution.org/cms-system-quick-cms.html | Product |
Configurations
History
17 Nov 2025, 19:28
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| First Time |
Opensolution quick.cms
Opensolution |
|
| References | () https://cert.pl/posts/2025/11/CVE-2025-9982 - Third Party Advisory | |
| References | () https://opensolution.org/cms-system-quick-cms.html - Product | |
| CPE | cpe:2.3:a:opensolution:quick.cms:6.8:*:*:*:*:*:*:* |
14 Nov 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-14 14:15
Updated : 2025-11-17 19:28
NVD link : CVE-2025-9982
Mitre link : CVE-2025-9982
CVE.ORG link : CVE-2025-9982
JSON object : View
Products Affected
opensolution
- quick.cms
CWE
CWE-256
Plaintext Storage of a Password
