Vaelsys VaelsysV4 up to 5.1.0/5.4.0 Web interface /grid/vgrid_server.php xajaxargs weak hash
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.5 | $0-$5k | 4.30 |
Summary
A vulnerability was found in Vaelsys VaelsysV4 up to 5.1.0/5.4.0. It has been declared as problematic. This vulnerability affects unknown code of the file /grid/vgrid_server.php of the component Web interface. Executing a manipulation of the argument xajaxargs can lead to weak hash. This vulnerability appears as CVE-2025-8260. The attack may be performed from remote. In addition, an exploit is available. It is recommended to upgrade the affected component.
Details
A vulnerability has been found in Vaelsys VaelsysV4 up to 5.1.0/5.4.0 (Video Surveillance Software) and classified as problematic. This vulnerability affects some unknown processing of the file /grid/vgrid_server.php of the component Web interface. The manipulation of the argument xajaxargs with an unknown input leads to a weak hash vulnerability. The CWE definition for the vulnerability is CWE-328. The product uses an algorithm that produces a digest (output value) that does not meet security expectations for a hash function that allows an adversary to reasonably determine the original input (preimage attack), find another input that can produce the same hash (2nd preimage attack), or find multiple inputs that evaluate to the same hash (birthday attack). As an impact it is known to affect confidentiality.
The weakness was presented 03/20/2026 as VSEC_V4_2025_07_0002. The advisory is shared for download at github.com. The advisory contains:
A sensitive information exposure issue was identified in the Vifence3/VaelsysV4 web interface that allows authenticated administrative users to list the MD5 password hashes of other user accounts. This behavior exposes credential material that should not be accessible, even to privileged users. If a weak or commonly used password is in place, an administrative user could potentially recover the original password through offline hash cracking techniques and impersonate another user. This could result in a loss of confidentiality and accountability, as actions could be performed under a different user identity. However, because all affected accounts hold administrative privileges, successful exploitation does not grant additional functional access beyond what the attacker already possesses with their own account. As a result, the practical impact is limited, since an administrative user cannot access functionality or resources that are not already available to them. Although the vulnerability report states that the issue can be exploited using an unauthenticated PHP session, Vaelsys has not been able to reproduce this behavior during internal testing. Based on our analysis, exploitation of this vulnerability requires a session authenticated with administrative privileges. Attempts to reproduce the issue using unauthenticated sessions, as well as sessions authenticated as operator or advanced operator users, were unsuccessful, even on vulnerable systems. The reporter also identified a separate vulnerability, tracked as VSEC-V4-2025-07-0001 / CVE-2025-8259, which affects a different execution path via the execute_DataObjectProc channel. That issue did allow access to certain resources using unauthenticated sessions. The vulnerability described in this advisory uses a different attack vector based on the xajax channel, which does not appear to be vulnerable to unauthenticated access. Nevertheless, the security of this channel has been reviewed and improved, and it now correctly returns an HTTP 401 (Unauthorized) response when accessed without authentication. Additional details can be found in the advisory for VSEC-V4-2025-07-0001.This vulnerability was named CVE-2025-8260. The exploitation appears to be difficult. The attack can be initiated remotely. Technical details and also a public exploit are known. The MITRE ATT&CK project declares the attack technique as T1600.001. The advisory points out:
VSEC_V4_2025_07_0002: Vaelsys MD5 hash leakage: https://vaelsys.github.io/security-advisory/advisories/VSEC_V4_2025_07_0002.html
It is possible to download the exploit at github.com. It is declared as proof-of-concept. By approaching the search of inurl:grid/vgrid_server.php it is possible to find vulnerable targets with Google Hacking.
Upgrading to version 5.1.1 or 5.4.1 eliminates this vulnerability. The upgrade is hosted for download at vaelsys.github.io.
VulDB is the best source for vulnerability data and more expert information about this specific topic.
Affected
- Vifence3
- VaelsysV4 VaelsysOS 8
- VaelsysV4 VaelsysOS 10 up to 5.1.0
- VaelsysV4 VaelsysOS 12 up to 5.4.0
Not Affected
- VaelsysV4 VaelsysOS 10 5.1.1
- VaelsysV4 VaelsysOS 12 5.4.1
Product
Type
Vendor
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔒VulDB Reliability: 🔍
CNA CVSS-B Score: 🔒
CNA CVSS-BT Score: 🔒
CNA Vector: 🔒
CVSSv3
VulDB Meta Base Score: 4.6VulDB Meta Temp Score: 4.5
VulDB Base Score: 3.1
VulDB Temp Score: 2.8
VulDB Vector: 🔒
VulDB Reliability: 🔍
NVD Base Score: 7.5
NVD Vector: 🔒
CNA Base Score: 3.1
CNA Vector: 🔒
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Exploiting
Class: Weak hashCWE: CWE-328 / CWE-327 / CWE-310
CAPEC: 🔒
ATT&CK: 🔒
Physical: No
Local: No
Remote: Yes
Availability: 🔒
Access: Public
Status: Proof-of-Concept
Download: 🔒
Google Hack: 🔒
EPSS Score: 🔒
EPSS Percentile: 🔒
Price Prediction: 🔍
Current Price Estimation: 🔒
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔒
Upgrade: VaelsysV4 5.1.1/5.4.1
Timeline
07/26/2025 VulDB entry created03/20/2026 Advisory disclosed
04/15/2026 VulDB entry last update
Sources
Advisory: VSEC_V4_2025_07_0002Status: Confirmed
Confirmation: 🔒
CVE: CVE-2025-8260 (🔒)
GCVE (CVE): GCVE-0-2025-8260
GCVE (VulDB): GCVE-100-317848
scip Labs: https://www.scip.ch/en/?labs.20161013
Entry
Created: 07/26/2025 18:19Updated: 04/15/2026 09:07
Changes: 07/26/2025 18:19 (56), 07/28/2025 08:33 (34), 08/01/2025 06:07 (12), 04/15/2026 09:02 (6), 04/15/2026 09:03 (9), 04/15/2026 09:06 (7), 04/15/2026 09:07 (1)
Complete: 🔍
Submitter: waiwai24
Committer: security_vaelsys
Cache ID: 216::103
Submit
Accepted
- Submit #616922: Vaelsys Vaelsys V4 v4.1.0 Unauthorized Access Leads to Sensitive Information Leakage (by waiwai24)
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.