Auth bypass in Open-WebUI. https://www.cve.org/CVERecord?id=CVE-2025-63391 > An authentication bypass vulnerability exists in Open-WebUI <=0.6.32 in the /api/config endpoint. The endpoint lacks proper authentication and authorization controls, exposing sensitive system configuration data to unauthenticated remote attackers.
Perfect 10 in HPE OneView with no description and the advisory behind a login? Must be good. Go hack that shit please. πŸ₯³ https://www.cve.org/CVERecord?id=CVE-2025-37164
> Public preview of synced passkeys brings the security benefits of MFA with simpler usability, while avoiding the security risks of weaker MFA options like SMS. However, even the simplest MFA can fail when credentials are lost, making account recovery a critical part of the user experience. To improve usability in such cases, we are introducing public preview for account recovery with AI-powered biometric match against government issued IDs across 192 countries. https://techcommunity.microsoft.com/blog/microsoft-entra-blog/synced-passkeys-and-high-assurance-account-recovery/3627343 image
RE: Apparently CVE-2025-59718 and CVE-2025-59719 are now EITW. View quoted note β†’
../ in FreshRSS. How did no one recommend that one to me yesterday? A new ../ would have been fun.
A couple vulns in Trail of Bits' Fickling.
RE: This is terrible, obviously. But another lesson for self hosting weirdos like me who offer services to friends and family is that the same outcome is possible with a simple accident or mistake. Be careful with other people's data. There's more to it than just encryption. View quoted note β†’
Ten CVEs in GitLab fixed, including four sev:HIGH ones.