CVE-2025-24858
Description
Develocity (formerly Gradle Enterprise) before 2024.3.1 allows an attacker who has network access to a Develocity server to obtain the hashed password of the system user. The hash algorithm used by Develocity was chosen according to best practices for password storage and provides some protection against brute-force attempts. The applicable severity of this vulnerability depends on whether a Develocity server is accessible by external or unauthorized users, and the complexity of the System User password.
Weakness Type (CWE)
References
Other References
Frequently Asked Questions
What is CVE-2025-24858? +
How do I check if I'm vulnerable to CVE-2025-24858? +
Related Vulnerabilities
An unauthenticated HTTP GET request to the /client.php endpoint will disclose the default administrator user credentials.
When the device is shared, the homepage module are before 2.19.0 in eWeLink Cloud Service allows Secondary user to take …
YugabyteDB has been collecting diagnostics information from YugabyteDB servers, which may include sensitive gflag configurations. To mitigate this, we recommend …
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. The MongoDB …
Sentry-Javascript is an official Sentry SDKs for JavaScript. From version 10.11.0 to before 10.27.0, when a Node.js application using the …
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions …