Loading HuntDB...

GHSA-5hh6-jrm5-mqxq

GitHub Security Advisory

⚠ Unreviewed HIGH Has CVE

Advisory Details

When Eclipse Mosquitto version 1.0 to 1.5.5 (inclusive) is configured to use a password file for authentication, any malformed data in the password file will be treated as valid. This typically means that the malformed data becomes a username and no password. If this occurs, clients can circumvent authentication and get access to the broker by using the malformed username. In particular, a blank line will be treated as a valid empty username. Other security measures are unaffected. Users who have only used the mosquitto_passwd utility to create and modify their password files are unaffected by this vulnerability.

Related CVEs

Key Information

GHSA ID
GHSA-5hh6-jrm5-mqxq
Published
May 13, 2022 1:34 AM
Last Modified
May 13, 2022 1:34 AM
CVSS Score
7.5 /10
Primary Ecosystem
Unknown
Primary Package
Unknown
GitHub Reviewed
✗ No

Dataset

Last updated: November 25, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.