VSEC_V4_2025_07_0002: Vaelsys MD5 hash leakage

Authenticated administrative users are able to access and disclose MD5 password hashes belonging to other user accounts.

Notification ID: VSEC_V4_2025_07_0002
CVE Identifier: CVE-2025-8260
Product: VaelsysV4
Component: /grid/vgrid_server.php (xajax)
Severity: Medium
Status: Fixed
Initial Publication Date: 2026-03-20
Last Updated: 2026-03-20

Summary

A sensitive information exposure issue was identified in the Vifence3/VaelsysV4 web interface that allows authenticated administrative users to list the MD5 password hashes of other user accounts. This behavior exposes credential material that should not be accessible, even to privileged users.

If a weak or commonly used password is in place, an administrative user could potentially recover the original password through offline hash cracking techniques and impersonate another user. This could result in a loss of confidentiality and accountability, as actions could be performed under a different user identity.

However, because all affected accounts hold administrative privileges, successful exploitation does not grant additional functional access beyond what the attacker already possesses with their own account. As a result, the practical impact is limited, since an administrative user cannot access functionality or resources that are not already available to them.

Impacted products

Vulnerability details

Identifier

This issue is tracked internally as VSEC_V4_2025_07_0002 and publicly as CVE-2025-8260. See the official CVE record at cve.org, and further details at NVD.

Severity

Public scoring for this issue varies, with some sources assigning a CVSS v3.1 base score around 7.5 (High) and others a lower score around 3.x–4.x (Low/Medium) (cvedetails.com, OpenCVE). Vaelsys treats this as a Medium severity weakness.

Authentication requirements clarification

Although the vulnerability report states that the issue can be exploited using an unauthenticated PHP session, Vaelsys has not been able to reproduce this behavior during internal testing. Based on our analysis, exploitation of this vulnerability requires a session authenticated with administrative privileges.

Attempts to reproduce the issue using unauthenticated sessions, as well as sessions authenticated as operator or advanced operator users, were unsuccessful, even on vulnerable systems.

The reporter also identified a separate vulnerability, tracked as VSEC-V4-2025-07-0001 / CVE-2025-8259, which affects a different execution path via the execute_DataObjectProc channel. That issue did allow access to certain resources using unauthenticated sessions.

The vulnerability described in this advisory uses a different attack vector based on the xajax channel, which does not appear to be vulnerable to unauthenticated access. Nevertheless, the security of this channel has been reviewed and improved, and it now correctly returns an HTTP 401 (Unauthorized) response when accessed without authentication. Additional details can be found in the advisory for VSEC-V4-2025-07-0001.

Vulnerability verification

Vaelsys provides a proof-of-concept script that can be used to verify whether a target system is vulnerable to VSEC_V4_2025_07_0002:

VSEC-V4-2025-07-0002.py

The script sends a crafted request to the affected endpoint in order to determine whether MD5 password hashes of other users can be listed by an authenticated administrator.

Script usage

usage: VSEC-V4-2025-07-0002.py [-h] -H HOST -p PORT -s SESSION [-v]

    required arguments:
      -H, --host       Target host or IP address
      -p, --port       Web interface port
      -s, --session    Valid PHP session ID

    optional arguments:
      -v, --verbose    Enable verbose output

Session requirements

The SESSION parameter must be a valid PHP session identifier used by the Vaelsys web interface.

Requests made with an unauthenticated session, or with a session authenticated as an operator or advanced operator, will fail even on vulnerable systems. The vulnerability can only be successfully exploited when using a session associated with an administrator account.

If the target system is vulnerable and the script is executed with an administrator-level session, the script will confirm the issue by successfully retrieving MD5 password hashes belonging to other user accounts. Otherwise, the script will report the target as not vulnerable.

Resolution

Fixes

The issue was resolved by ensuring that user objects returned by the server no longer include password hash information under any circumstances.

Specifically, the logic responsible for serializing and returning user data was reviewed and modified so that password hashes are never exposed in server responses, even to authenticated administrative users.

In addition, access control checks were verified to confirm that lower-privileged roles, such as operator and advanced operator, do not have and did not previously have the ability to create or modify user accounts. As a result, these roles are not and were not able to access password hash data before or after the remediation.

Due to technical constraints on existing deployed devices, the password hashing technology has not been changed as part of this remediation. Migrating to a different hashing algorithm would require resetting all user accounts on the devices after the update, which is not feasible for already deployed systems.

While MD5 is considered a legacy hashing algorithm, it remains acceptable when used with strong, high-entropy passwords. The exposure risk has been mitigated by preventing any access to password hashes. Future versions of the software will replace the current hashing mechanism with a more modern and robust password hashing technology.

Published updates

Updated software versions have been released for all non-discontinued products to address this vulnerability. Customers using supported VaelsysV4 platforms are strongly advised to upgrade to the fixed versions listed above in order to fully remediate the issue.

Product Version Status Fixed Version Notes
Vifence3 All versions Affected Discontinued product Ensure all passwords are strong, apply network mitigations, do not expose web interface to public networks. Consider updating to a newer VaelsysV4 device.
VaelsysV4 - VaelsysOS 8 All versions Affected Discontinued product Ensure all passwords are strong, apply network mitigations, do not expose web interface to public networks. Consider updating to a newer VaelsysV4 device.
VaelsysV4 - VaelsysOS 10 4.0.0-5.1.0 Fixed 5.1.1 Ensure all passwords are strong, update to 5.1.1 using automatic updates, Apply network mitigations, do not expose web interface to public networks.
VaelsysV4 - VaelsysOS 12 5.1.1-5.4.0 Fixed 5.4.1 Ensure all passwords are strong, update to 5.4.1 using automatic updates, Apply network mitigations, do not expose web interface to public networks.

Workarounds and mitigations

Acknowledgments and source

Information about this vulnerability leverages public research contained in 0101/CVEs/Vaelsys and contributions by GitHub user waiwai24, together with publicly available CVE and NVD records.

Contact and reporting

To report a suspected security issue in Vaelsys products, contact security@vaelsys.com following the guidance on the Vaelsys security advisory main page.

Change log