PimpMyLog 1.7.14 contains an improper access control vulnerability that allows remote attackers to create admin accounts without authorization through the configuration endpoint. Attackers can exploit the unsanitized username field to inject malicious JavaScript, create a hidden backdoor account, and potentially access sensitive server-side log information and environmental variables.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 31 Dec 2025 04:00:00 +0900

Type Values Removed Values Added
First Time appeared Potsky
Potsky pimp My Log
CPEs cpe:2.3:a:potsky:pimp_my_log:1.7.14:*:*:*:*:*:*:*
Vendors & Products Potsky
Potsky pimp My Log

Fri, 19 Dec 2025 06:00:00 +0900

Type Values Removed Values Added
Metrics cvssV4_0

{'score': 0, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Wed, 17 Dec 2025 23:30:00 +0900

Type Values Removed Values Added
First Time appeared Pimpmylog
Pimpmylog pimpmylog
Vendors & Products Pimpmylog
Pimpmylog pimpmylog

Wed, 17 Dec 2025 07:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 17 Dec 2025 02:30:00 +0900


Wed, 17 Dec 2025 02:15:00 +0900

Type Values Removed Values Added
Description PimpMyLog 1.7.14 contains an improper access control vulnerability that allows remote attackers to create admin accounts without authorization through the configuration endpoint. Attackers can exploit the unsanitized username field to inject malicious JavaScript, create a hidden backdoor account, and potentially access sensitive server-side log information and environmental variables.
Title PimpMyLog 1.7.14 Improper Access Control via Account Creation Endpoint
Weaknesses CWE-285
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 0, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-18T20:53:57.705Z

Reserved: 2025-12-16T00:10:40.313Z

Link: CVE-2023-53895

cve-icon Vulnrichment

Updated: 2025-12-16T21:44:26.574Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-16T17:16:01.740

Modified: 2025-12-30T18:45:51.587

Link: CVE-2023-53895

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-17T23:29:05Z

Weaknesses