A CORS misconfiguration in Eramba Community and Enterprise Editions v3.26.0 allows an attacker-controlled Origin header to be reflected in the Access-Control-Allow-Origin response along with Access-Control-Allow-Credentials: true. This permits malicious third-party websites to perform authenticated cross-origin requests against the Eramba API, including endpoints like /system-api/login and /system-api/user/me. The response includes sensitive user session data (ID, name, email, access groups), which is accessible to the attacker's JavaScript. This flaw enables full session hijack and data exfiltration without user interaction. Eramba versions 3.23.3 and earlier were tested and appear unaffected. The vulnerability is present in default installations, requiring no custom configuration.
Metrics
Affected Vendors & Products
References
History
Wed, 14 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-942 | |
| Metrics |
cvssV3_1
|
Wed, 14 Jan 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eramba
Eramba eramba |
|
| Vendors & Products |
Eramba
Eramba eramba |
Tue, 13 Jan 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A CORS misconfiguration in Eramba Community and Enterprise Editions v3.26.0 allows an attacker-controlled Origin header to be reflected in the Access-Control-Allow-Origin response along with Access-Control-Allow-Credentials: true. This permits malicious third-party websites to perform authenticated cross-origin requests against the Eramba API, including endpoints like /system-api/login and /system-api/user/me. The response includes sensitive user session data (ID, name, email, access groups), which is accessible to the attacker's JavaScript. This flaw enables full session hijack and data exfiltration without user interaction. Eramba versions 3.23.3 and earlier were tested and appear unaffected. The vulnerability is present in default installations, requiring no custom configuration. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2026-01-13T00:00:00.000Z
Updated: 2026-01-14T21:30:01.077Z
Reserved: 2025-08-13T00:00:00.000Z
Link: CVE-2025-55462
Updated: 2026-01-13T15:07:03.653Z
Status : Awaiting Analysis
Published: 2026-01-13T15:15:58.950
Modified: 2026-01-14T22:15:50.717
Link: CVE-2025-55462
No data.