First published: Wed Apr 23 2025(Updated: )
This vulnerability exists in the Meon KYC solutions due to transmission of sensitive data in plain text within the response payloads of certain API endpoints. An authenticated remote attacker could exploit this vulnerability by intercepting API response that contains unencrypted sensitive information belonging to other users. Successful exploitation of this vulnerability could allow remote attacker to impersonate the target user and gain unauthorized access to the user account.
Credit: vdisclose@cert-in.org.in
Affected Software | Affected Version | How to fix |
---|---|---|
Meon KYC solutions |
Upgrade KYC Solutions to version 1.2
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-42603 is considered a moderate severity vulnerability due to the exposure of sensitive data.
To fix CVE-2025-42603, implement encryption for sensitive data in API response payloads.
CVE-2025-42603 affects sensitive data transmitted in plain text within API responses.
An authenticated remote attacker could exploit CVE-2025-42603 by intercepting unencrypted API responses.
CVE-2025-42603 is found in Meon KYC solutions.