
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability has been identified in Cpacker MemGPT v0.3.17, tracked as CVE-2024-39025. The vulnerability stems from incorrect access control implementation in the /users endpoint, which allows attackers to access sensitive data. The issue was disclosed on December 27, 2024, and received a CVSS v3.1 base score of 7.5 (HIGH) (NVD).
The vulnerability is classified as an Incorrect Authorization issue (CWE-863) affecting the /users endpoint of the admin API. The security flaw exists due to improper authorization checks that fail to restrict access to sensitive user data. The vulnerability has received a CVSS v3.1 vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating it can be exploited remotely with no privileges required (CISA-ADP, CNetSec).
The vulnerability allows unauthorized actors to access sensitive user data remotely, potentially exposing confidential information stored in the database. This represents a significant breach of data privacy and violates the principle of least privilege (CNetSec).
Users are advised to update to the latest version of the software. The vulnerability was identified in version 0.3.17, and fixes should be implemented in subsequent releases (GitHub Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."