{"uuid": "bebda209-1d88-41bf-8625-77da609947cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2402", "type": "seen", "source": "https://t.me/cvedetector/21565", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2402 - Minio Hardcoded Password Remote Authentication Bypass and Data Manipulation Vulnerability in KNIME Business Hub\", \n  \"Content\": \"CVE ID : CVE-2025-2402 \nPublished : March 31, 2025, 7:15 a.m. | 1\u00a0hour, 32\u00a0minutes ago \nDescription : A hard-coded, non-random password for the object store (minio) of KNIME Business Hub in all versions except the ones listed below allows an unauthenticated remote attacker in possession of the password to read and manipulate swapped jobs or read and manipulate in- and output data of active jobs. It is also possible to cause a denial-of-service of most functionality of KNIME Business Hub by writing large amounts of data to the object store directly.   \n  \n  \n  \nThere are no viable workarounds therefore we strongly recommend to update to one of the following versions of KNIME Business Hub:   \n  \n  \n  \n  *  1.13.2 or later   \n  \n  \n  \n  \n  \n  \n  *  1.12.3 or later   \n  \n  \n  \n  \n  \n  \n  *  1.11.3 or later   \n  \n  \n  \n  \n  \n  \n  *  1.10.3 or later \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T10:49:40.000000Z"}