Cleartext Storage of Sensitive Information Affecting mickem/nscp package, versions [,0.8.0)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cleartext Storage of Sensitive Information vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-MICKEMNSCP-10591698
  • published4 Jul 2025
  • disclosed2 Jul 2025
  • creditkindredsec, BZYO, Yann Castel

Introduced: 2 Jul 2025

NewCVE-2025-34078  (opens in a new tab)
CWE-312  (opens in a new tab)

How to fix?

Upgrade mickem/nscp to version 0.8.0 or higher.

Overview

Affected versions of this package are vulnerable to Cleartext Storage of Sensitive Information due to the nsclient.ini configuration file storing administrative credentials in plaintext, which are accessible to local users. An attacker can gain administrative access to the web interface by extracting these credentials and then execute arbitrary commands as SYSTEM by abusing the ExternalScripts plugin to register and trigger custom scripts through the API. This is only exploitable if both the web interface and ExternalScripts features are enabled.

CVSS Base Scores

version 4.0
version 3.1