Vulnerability Database

319,703

Total vulnerabilities in the database

CVE-2025-58580

An API endpoint allows arbitrary log entries to be created via POST request. Without sufficient validation of the input data, an attacker can create manipulated log entries and thus falsify or dilute logs, for example.

  • Published: Oct 6, 2025
  • Updated: Nov 16, 2025
  • CVE: CVE-2025-58580
  • Severity: Medium
  • Exploit:

CVSS v3:

  • Severity: Medium
  • Score: 6.5
  • AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

CWEs: