CVE-2025-26201
📋 TL;DR
GreaterWMS versions up to 2.1.49 contain an authentication bypass vulnerability in the /staff route that allows unauthenticated remote attackers to access credentials and escalate privileges. This affects all deployments running vulnerable versions of GreaterWMS, particularly those exposed to untrusted networks.
💻 Affected Systems
- GreaterWMS
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with administrative access, credential theft, data exfiltration, and potential lateral movement to other systems.
Likely Case
Unauthorized access to sensitive staff credentials, privilege escalation to administrative functions, and potential data manipulation or theft.
If Mitigated
Limited impact with proper network segmentation and access controls, though credential exposure still poses significant risk.
🎯 Exploit Status
Simple HTTP request to /staff endpoint can bypass authentication. Proof of concept available in GitHub references.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: > 2.1.49
Vendor Advisory: https://github.com/GreaterWMS/GreaterWMS/issues/383
Restart Required: Yes
Instructions:
1. Upgrade GreaterWMS to version > 2.1.49. 2. Restart the GreaterWMS service. 3. Verify the /staff route now requires proper authentication.
🔧 Temporary Workarounds
Block /staff route at web server
allConfigure web server to block or restrict access to the vulnerable /staff endpoint
# For nginx: location /staff { deny all; }
# For Apache: <Location /staff> Require all denied </Location>
Network access control
linuxRestrict network access to GreaterWMS to trusted IPs only
# Example iptables: iptables -A INPUT -p tcp --dport [GreaterWMS_port] -s [trusted_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [GreaterWMS_port] -j DROP
🧯 If You Can't Patch
- Implement strict network segmentation and firewall rules to limit access to GreaterWMS
- Deploy web application firewall (WAF) with rules to block unauthorized /staff access
🔍 How to Verify
Check if Vulnerable:
Send HTTP GET request to http://[target]/staff without authentication. If it returns staff data or bypasses login, system is vulnerable.
Check Version:
Check GreaterWMS version in web interface or configuration files. For docker: docker inspect [container] | grep -i version
Verify Fix Applied:
After patching, attempt same request. Should receive authentication error or redirect to login page.
📡 Detection & Monitoring
Log Indicators:
- Unusual access to /staff route from unauthenticated users
- Multiple failed authentication attempts followed by /staff access
Network Indicators:
- HTTP GET requests to /staff endpoint without authentication headers
- Unusual traffic patterns to staff-related endpoints
SIEM Query:
source="web_logs" AND (uri_path="/staff" AND NOT (user_agent="*bot*" OR user="authenticated_user"))