
CVE-2025-49831 – Conjur OSS and Secrets Manager, Self-Hosted (formerly Conjur Enterprise) vulnerable to IAM Authenticator Bypass via Mis-configured Network Device
https://notcve.org/view.php?id=CVE-2025-49831
15 Jul 2025 — An attacker of Secrets Manager, Self-Hosted installations that route traffic from Secrets Manager to AWS through a misconfigured network device can reroute authentication requests to a malicious server under the attacker’s control. CyberArk believes there to be very few installations where this issue can be actively exploited, though Secrets Manager, Self-Hosted (formerly Conjur Enterprise) prior to versions 13.5.1 and 13.6.1 and Conjur OSS prior to version 1.22.1 may be affected. Conjur OSS version 1.22.1 ... • https://github.com/cyberark/conjur/releases/tag/v1.22.1 • CWE-287: Improper Authentication •

CVE-2025-49830 – Conjur OSS and Secrets Manager, Self-Hosted (formerly Conjur Enterprise) vulnerable to path traversal and file disclosure
https://notcve.org/view.php?id=CVE-2025-49830
15 Jul 2025 — Conjur provides secrets management and application identity for infrastructure. An authenticated attacker who is able to load policy can use the policy yaml parser to reference files on the Secrets Manager, Self-Hosted server. These references may be used as reconnaissance to better understand the folder structure of the Secrets Manager/Conjur server or to have the yaml parser include files on the server in the yaml that is processed as the policy loads. This issue affects Secrets Manager, Self-Hosted (form... • https://github.com/cyberark/conjur/releases/tag/v1.22.1 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2025-49829 – Conjur OSS and Secrets Manager, Self-Hosted (formerly Conjur Enterprise) missing validations
https://notcve.org/view.php?id=CVE-2025-49829
15 Jul 2025 — Conjur provides secrets management and application identity for infrastructure. Missing validations in Secrets Manager, Self-Hosted allows authenticated attackers to inject resources into the database and to bypass permission checks. This issue affects Secrets Manager, Self-Hosted (formerly Conjur Enterprise) prior to versions 13.5.1 and 13.6.1 and Conjur OSS prior to version 1.22.1. Conjur OSS version 1.22.1 and Secrets Manager, Self-Hosted versions 13.5.1 and 13.6.1 fix the issue. • https://github.com/cyberark/conjur/releases/tag/v1.22.1 • CWE-862: Missing Authorization •

CVE-2025-49828 – Conjur OSS and Secrets Manager, Self-Hosted (formerly Conjur Enterprise) Vulnerable to Remote Code Execution
https://notcve.org/view.php?id=CVE-2025-49828
15 Jul 2025 — Conjur provides secrets management and application identity for infrastructure. Conjur OSS versions 1.19.5 through 1.21.1 and Secrets Manager, Self-Hosted (formerly known as Conjur Enterprise) 13.1 through 13.4.1 are vulnerable to remote code execution An authenticated attacker who can inject secrets or templates into the Secrets Manager, Self-Hosted database could take advantage of an exposed API endpoint to execute arbitrary Ruby code within the Secrets Manager process. This issue affects both Secrets Man... • https://github.com/cyberark/conjur/releases/tag/v1.21.2 • CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine •

CVE-2025-49827 – Conjur OSS and Secrets Manager, Self-Hosted (formerly Conjur Enterprise) Vulnerable to Bypass of IAM Authenticator
https://notcve.org/view.php?id=CVE-2025-49827
15 Jul 2025 — Conjur provides secrets management and application identity for infrastructure. Conjur OSS versions 1.19.5 through 1.22.0 and Secrets Manager, Self-Hosted (formerly known as Conjur Enterprise) 13.1 through 13.5 and 13.6 are vulnerable to bypass of the IAM authenticator. An attacker who can manipulate the headers signed by AWS can take advantage of a malformed regular expression to redirect the authentication validation request that Secrets Manager, Self-Hosted sends to AWS to a malicious server controlled b... • https://github.com/cyberark/conjur/releases/tag/v1.22.1 • CWE-807: Reliance on Untrusted Inputs in a Security Decision •

CVE-2025-22274 – HTML injection in CyberArk Endpoint Privilege Manager
https://notcve.org/view.php?id=CVE-2025-22274
28 Feb 2025 — It is possible to inject HTML code into the page content using the "content" field in the "Application definition" page. This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After multiple attempts to contact the vendor we did not receive any answer. It is possible to inject HTML code into the page content using the "content" field in the "Application definition" page. • https://cert.pl/en/posts/2025/02/CVE-2025-22270 • CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) •

CVE-2025-22273 – Lack of rate-limiting in password change mechanism in CyberArk Endpoint Privilege Manager
https://notcve.org/view.php?id=CVE-2025-22273
28 Feb 2025 — Application does not limit the number or frequency of user interactions, such as the number of incoming requests. At the "/EPMUI/VfManager.asmx/ChangePassword" endpoint it is possible to perform a brute force attack on the current password in use. This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After multiple attempts to contact the vendor we did not receive any answer. • https://cert.pl/en/posts/2025/02/CVE-2025-22270 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVE-2025-22272 – Self Reflected XSS in CyberArk Endpoint Privilege Manager
https://notcve.org/view.php?id=CVE-2025-22272
28 Feb 2025 — In the "/EPMUI/ModalDlgHandler.ashx?value=showReadonlyDlg" endpoint, it is possible to inject code in the "modalDlgMsgInternal" parameter via POST, which is then executed in the browser. The risk of exploiting vulnerability is reduced due to the required additional bypassing the Content-Security-Policy policy This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After multiple attempts to contact the vendor we did not receive any answer. • https://cert.pl/en/posts/2025/02/CVE-2025-22270 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2025-22271 – IP Spoofing in CyberArk Endpoint Privilege Manager
https://notcve.org/view.php?id=CVE-2025-22271
28 Feb 2025 — The application or its infrastructure allows for IP address spoofing by providing its own value in the "X-Forwarded-For" header. Thus, the action logging mechanism in the application loses accountability This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After multiple attempts to contact the vendor we did not receive any answer. The application or its infrastructure allows for IP address spoofing by providing its own value in the "X-Forwa... • https://cert.pl/en/posts/2025/02/CVE-2025-22270 • CWE-290: Authentication Bypass by Spoofing •

CVE-2025-22270 – Stored XSS in CyberArk Endpoint Privilege Manager
https://notcve.org/view.php?id=CVE-2025-22270
28 Feb 2025 — An attacker with access to the Administration panel, specifically the "Role Management" tab, can inject code by adding a new role in the "name" field. It should be noted, however, that the risk of exploiting vulnerability is reduced due to the required additional error that allows bypassing the Content-Security-Policy policy, which mitigates JS code execution while still allowing HTML injection. This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is un... • https://cert.pl/en/posts/2025/02/CVE-2025-22270 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •