4.3

CVE-2025-32916

Medienbericht
Potential use of sensitive information in GET requests in Checkmk GmbH's Checkmk versions <2.4.0p13, <2.3.0p38, <2.2.0p46, and 2.1.0 (EOL) may cause sensitive form data to be included in URL query parameters, which may be logged in various places such as browser history or web server logs.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CheckmkCheckmk Version >= 2.1.0 < 2.2.0
CheckmkCheckmk Version2.2.0 Update-
CheckmkCheckmk Version2.2.0 Updatep1
CheckmkCheckmk Version2.2.0 Updatep10
CheckmkCheckmk Version2.2.0 Updatep11
CheckmkCheckmk Version2.2.0 Updatep12
CheckmkCheckmk Version2.2.0 Updatep13
CheckmkCheckmk Version2.2.0 Updatep14
CheckmkCheckmk Version2.2.0 Updatep16
CheckmkCheckmk Version2.2.0 Updatep17
CheckmkCheckmk Version2.2.0 Updatep18
CheckmkCheckmk Version2.2.0 Updatep19
CheckmkCheckmk Version2.2.0 Updatep21
CheckmkCheckmk Version2.2.0 Updatep22
CheckmkCheckmk Version2.2.0 Updatep23
CheckmkCheckmk Version2.2.0 Updatep24
CheckmkCheckmk Version2.2.0 Updatep25
CheckmkCheckmk Version2.2.0 Updatep26
CheckmkCheckmk Version2.2.0 Updatep27
CheckmkCheckmk Version2.2.0 Updatep28
CheckmkCheckmk Version2.2.0 Updatep29
CheckmkCheckmk Version2.2.0 Updatep3
CheckmkCheckmk Version2.2.0 Updatep30
CheckmkCheckmk Version2.2.0 Updatep31
CheckmkCheckmk Version2.2.0 Updatep32
CheckmkCheckmk Version2.2.0 Updatep33
CheckmkCheckmk Version2.2.0 Updatep34
CheckmkCheckmk Version2.2.0 Updatep35
CheckmkCheckmk Version2.2.0 Updatep36
CheckmkCheckmk Version2.2.0 Updatep37
CheckmkCheckmk Version2.2.0 Updatep38
CheckmkCheckmk Version2.2.0 Updatep39
CheckmkCheckmk Version2.2.0 Updatep4
CheckmkCheckmk Version2.2.0 Updatep40
CheckmkCheckmk Version2.2.0 Updatep41
CheckmkCheckmk Version2.2.0 Updatep42
CheckmkCheckmk Version2.2.0 Updatep43
CheckmkCheckmk Version2.2.0 Updatep44
CheckmkCheckmk Version2.2.0 Updatep45
CheckmkCheckmk Version2.2.0 Updatep5
CheckmkCheckmk Version2.2.0 Updatep6
CheckmkCheckmk Version2.2.0 Updatep7
CheckmkCheckmk Version2.2.0 Updatep8
CheckmkCheckmk Version2.2.0 Updatep9
CheckmkCheckmk Version2.3.0 Update-
CheckmkCheckmk Version2.3.0 Updatep1
CheckmkCheckmk Version2.3.0 Updatep10
CheckmkCheckmk Version2.3.0 Updatep11
CheckmkCheckmk Version2.3.0 Updatep12
CheckmkCheckmk Version2.3.0 Updatep13
CheckmkCheckmk Version2.3.0 Updatep14
CheckmkCheckmk Version2.3.0 Updatep15
CheckmkCheckmk Version2.3.0 Updatep16
CheckmkCheckmk Version2.3.0 Updatep17
CheckmkCheckmk Version2.3.0 Updatep18
CheckmkCheckmk Version2.3.0 Updatep19
CheckmkCheckmk Version2.3.0 Updatep2
CheckmkCheckmk Version2.3.0 Updatep20
CheckmkCheckmk Version2.3.0 Updatep21
CheckmkCheckmk Version2.3.0 Updatep22
CheckmkCheckmk Version2.3.0 Updatep23
CheckmkCheckmk Version2.3.0 Updatep24
CheckmkCheckmk Version2.3.0 Updatep25
CheckmkCheckmk Version2.3.0 Updatep26
CheckmkCheckmk Version2.3.0 Updatep27
CheckmkCheckmk Version2.3.0 Updatep28
CheckmkCheckmk Version2.3.0 Updatep29
CheckmkCheckmk Version2.3.0 Updatep3
CheckmkCheckmk Version2.3.0 Updatep30
CheckmkCheckmk Version2.3.0 Updatep31
CheckmkCheckmk Version2.3.0 Updatep32
CheckmkCheckmk Version2.3.0 Updatep33
CheckmkCheckmk Version2.3.0 Updatep34
CheckmkCheckmk Version2.3.0 Updatep35
CheckmkCheckmk Version2.3.0 Updatep36
CheckmkCheckmk Version2.3.0 Updatep37
CheckmkCheckmk Version2.3.0 Updatep4
CheckmkCheckmk Version2.3.0 Updatep5
CheckmkCheckmk Version2.3.0 Updatep6
CheckmkCheckmk Version2.3.0 Updatep7
CheckmkCheckmk Version2.3.0 Updatep8
CheckmkCheckmk Version2.3.0 Updatep9
CheckmkCheckmk Version2.4.0 Update-
CheckmkCheckmk Version2.4.0 Updatep1
CheckmkCheckmk Version2.4.0 Updatep10
CheckmkCheckmk Version2.4.0 Updatep11
CheckmkCheckmk Version2.4.0 Updatep12
CheckmkCheckmk Version2.4.0 Updatep2
CheckmkCheckmk Version2.4.0 Updatep3
CheckmkCheckmk Version2.4.0 Updatep4
CheckmkCheckmk Version2.4.0 Updatep5
CheckmkCheckmk Version2.4.0 Updatep6
CheckmkCheckmk Version2.4.0 Updatep7
CheckmkCheckmk Version2.4.0 Updatep8
CheckmkCheckmk Version2.4.0 Updatep9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.123
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.3 2.8 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
security@checkmk.com 1 0 0
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CWE-598 Use of GET Request Method With Sensitive Query Strings

The web application uses the HTTP GET method to process a request and includes sensitive information in the query string of that request.