Submeter #721893: https://doc.cms.talelin.com/ Lin-CMS 0.6.0 weak passwordinformação

Títulohttps://doc.cms.talelin.com/ Lin-CMS 0.6.0 weak password
DescriçãoLin CMS is a CMS solution that separates the front and back ends. Lin not only provides background support, but also has a corresponding front-end system. Lin currently has implementation in Python, Node.js and Java versions. The tests folder is a file used by developers for testing, and the config.py file exists in the tests folder.This file contains the administrator's default account and password.Due to the failure to delete and clean up in time, a security risk was left behind. Attackers can directly log in with the default administrator account and password that have not been cleared, gain control of the account, and thus face high risks such as complete system takeover and leakage of sensitive information.
Fonte⚠️ https://github.com/m3ngx1ng/cve/blob/4690d4020a4a642af4c50912f762937292228641/lin-cms.md
Utilizador
 m3x1 (UID 92411)
Submissão23/12/2025 10h22 (há 4 meses)
Moderação27/12/2025 14h55 (4 days later)
EstadoAceite
Entrada VulDB338528 [TaleLin Lin-CMS até 0.6.0 Tests Folder /tests/config.py username/password Divulgação de Informação]
Pontos20

Want to know what is going to be exploited?

We predict KEV entries!