CVE-2025-27408

4.8 MEDIUM

📋 TL;DR

Manifest micro back end versions before 4.9.2 use unsalted SHA3 hashing for passwords, making stored credentials vulnerable to cracking if database access is obtained. This affects all users of vulnerable Manifest deployments. Attackers can more easily crack password hashes and identify reused passwords across accounts.

💻 Affected Systems

Products:
  • Manifest
Versions: All versions before 4.9.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using default password hashing are affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full credential compromise leading to account takeover, lateral movement, and potential data breach if password reuse exists.

🟠

Likely Case

Targeted password cracking of specific user accounts after database exfiltration, potentially enabling unauthorized access.

🟢

If Mitigated

Limited impact with strong unique passwords and proper access controls, though still vulnerable to rainbow table attacks.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires database access first, then standard password cracking techniques apply.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.9.2

Vendor Advisory: https://github.com/mnfst/manifest/security/advisories/GHSA-h8h6-7752-g28c

Restart Required: Yes

Instructions:

1. Backup your Manifest deployment. 2. Update to version 4.9.2 or later. 3. Restart the Manifest service. 4. Force password resets for all users to generate new salted hashes.

🔧 Temporary Workarounds

Force Password Reset

all

Require all users to change passwords to generate new hashes with improved algorithm

🧯 If You Can't Patch

  • Implement strict database access controls and monitoring
  • Enforce strong password policies and require unique passwords per user

🔍 How to Verify

Check if Vulnerable:

Check Manifest version: if below 4.9.2, it's vulnerable. Review password hashing implementation in source code.

Check Version:

Check package.json or deployment configuration for version number

Verify Fix Applied:

Confirm version is 4.9.2 or higher and check that password hashing uses proper salted algorithm.

📡 Detection & Monitoring

Log Indicators:

  • Unusual database access patterns
  • Failed login attempts with cracked passwords

Network Indicators:

  • Unexpected database connections
  • Large data exfiltration from database

SIEM Query:

source="database_logs" AND (event="unauthorized_access" OR data_transfer>threshold)

🔗 References

📤 Share & Export