icon

We found results for “

CVE-2025-50691

Good to know:

icon
icon

Date: August 21, 2025

MCSManager 10.5.3 daemon process runs as a root account by default, and its sensitive data (including tokens and terminal content) is stored in the data directory, readable by all users. Other users on the system can read the daemon's key and use it to log in, leading to privilege escalation.

Severity Score

Severity Score

Weakness Type (CWE)

Incorrect Privilege Assignment

CWE-266

Top Fix

icon

Upgrade Version

Upgrade to version https://github.com/MCSManager/MCSManager.git - null

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): LOW
Integrity (I): NONE
Availability (A): NONE

Do you need more information?

Contact Us