BIT-limesurvey-2025-41076

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/limesurvey/BIT-limesurvey-2025-41076.json
JSON Data
https://api.test.osv.dev/v1/vulns/BIT-limesurvey-2025-41076
Aliases
Published
2025-11-22T08:41:50.495Z
Modified
2025-11-22T09:27:47.434996Z
Summary
Multiple vulnerabilities in Limesurvey
Details

In version 6.13.0 of LimeSurvey, any external user can cause a 500 error in the survey system by sending a malformed session cookie. Instead of displaying a generic error message, the system exposes internal backend information, including the use of the Yii framework, the MySQL/MariaDB database engine, the table name 'lime_sessions', primary keys, and fragments of the content that caused the conflict. This information can simplify the collection of data about the internal architecture of the application by an attacker.

Database specific
{
    "severity": "Medium",
    "cpes": [
        "cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*"
    ]
}
References

Affected packages

Bitnami / limesurvey

Package

Name
limesurvey
Purl
pkg:bitnami/limesurvey

Severity

  • 6.9 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
6.13.0
Fixed
6.15.5