CVE-2025-52026
Published: 23 January 2026
Summary
CVE-2025-52026 is a high-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability in Aptsys Gemscms Backend. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 3.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Automated marking applies security attributes to system outputs, making it harder for attackers to exploit unmarked sensitive information leading to unauthorized exposure.
Proper attribute retention and permitted-value enforcement limits unauthorized actors from accessing sensitive information lacking correct labels.
Prevents unauthorized exposure of sensitive information by prohibiting untrusted external systems from processing or storing it.
By enforcing authorization matching prior to sharing, the control reduces the risk of exposing sensitive information to unauthorized actors.
Review and removal of nonpublic information from publicly accessible systems directly prevents exposure of sensitive data to unauthorized actors.
Data mining protection mechanisms detect and block unauthorized bulk extraction of sensitive data, directly mitigating exposure to unauthorized actors.
Literacy training teaches users to recognize and avoid actions that result in unauthorized exposure of sensitive information.
Retaining and monitoring training records confirms personnel have completed privacy and security awareness training on handling sensitive data, reducing the chance of unauthorized exposure due to lack of knowledge.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated public endpoint disclosure of accounts and crackable MD5 credentials directly enables exploitation of public-facing app (T1190), unsecured credential exposure (T1552), and account discovery (T1087).
NVD Description
An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a…
more
broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.
Deeper analysisAI
An information disclosure vulnerability, tracked as CVE-2025-52026, affects the /srvs/membersrv/getCashiers endpoint in the Aptsys gemscms backend platform through version 2025-05-28. This unauthenticated endpoint exposes a list of cashier accounts, including names, email addresses, usernames, and passwords hashed with MD5. As MD5 is a broken cryptographic hash function vulnerable to CWE-327, the hashes can be readily reversed to plaintext using public tools, leading to CWE-200 information disclosure. The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Remote attackers require no privileges or user interaction to exploit this vulnerability over the network. By sending a request to the exposed endpoint, they can retrieve the full list of cashier credentials in hashed form, crack the MD5 hashes offline, and then perform unauthorized logins using the recovered plaintext passwords, usernames, and associated details. Successful exploitation enables attackers to impersonate cashiers and potentially access sensitive point-of-sale (POS) operations or backend administrative functions.
Mitigation details and advisories are referenced on the vendor site at http://aptsys.com, along with a GitHub Gist at https://gist.github.com/ReverseThatApp/4a6be2b9b2ba39d38c35c8753e0afd39 that likely contains proof-of-concept information or reversal tools. Security practitioners should check these resources for patches, version upgrades beyond 2025-05-28, or endpoint access controls.
Details
- CWE(s)