Loading HuntDB...

GHSA-j65r-g7q2-f8v3

GitHub Security Advisory

Pimcore customers' list user password hash is disclosed

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

### Impact
The customer view exposes the hashed password along with other deails. An attacker is then able to enum password of a particular id, likewise we can replace id with other user , for example 1015, password hash can be disclosed which can be further cracked with hashcat

### Patches
Update to version 3.3.10 or apply this patch manually https://github.com/pimcore/customer-data-framework/commit/d1d58c10313f080737dc1e71fab3beb12488a1e6.patch

### Workarounds
Apply https://github.com/pimcore/customer-data-framework/commit/d1d58c10313f080737dc1e71fab3beb12488a1e6.patch manually.

### References
https://huntr.dev/bounties/db6c32f4-742e-4262-8fd5-cefd0f133416/

Affected Packages

Packagist pimcore/customer-management-framework-bundle
Affected versions: 0 (fixed in 3.3.10)

Related CVEs

Key Information

GHSA ID
GHSA-j65r-g7q2-f8v3
Published
May 25, 2023 4:57 PM
Last Modified
May 25, 2023 4:57 PM
CVSS Score
5.0 /10
Primary Ecosystem
Packagist
Primary Package
pimcore/customer-management-framework-bundle
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 12, 2025 6:34 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.