M/Monit 3.7.4 contains an authentication vulnerability that allows authenticated attackers to retrieve user password hashes through an administrative API endpoint. Attackers can send requests to the /api/1/admin/users/list and /api/1/admin/users/get endpoints to extract MD5 password hashes for all users.
Metrics
Affected Vendors & Products
References
History
Thu, 29 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 Jan 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tildeslash
Tildeslash monit |
|
| Vendors & Products |
Tildeslash
Tildeslash monit |
Wed, 28 Jan 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | M/Monit 3.7.4 contains an authentication vulnerability that allows authenticated attackers to retrieve user password hashes through an administrative API endpoint. Attackers can send requests to the /api/1/admin/users/list and /api/1/admin/users/get endpoints to extract MD5 password hashes for all users. | |
| Title | M/Monit 3.7.4 - Password Disclosure | |
| Weaknesses | CWE-522 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-01-28T17:35:10.300Z
Updated: 2026-01-29T18:12:00.901Z
Reserved: 2026-01-27T15:47:07.998Z
Link: CVE-2020-36968
Updated: 2026-01-28T18:59:05.118Z
Status : Awaiting Analysis
Published: 2026-01-28T18:16:47.147
Modified: 2026-01-29T16:31:00.867
Link: CVE-2020-36968
No data.