CVE-2025-52024

CRITICAL
2026-01-23 [email protected]
9.4
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
Low

Lifecycle Timeline

2
Analysis Generated
Mar 12, 2026 - 21:54 vuln.today
CVE Published
Jan 23, 2026 - 21:15 nvd
CRITICAL 9.4

Description

A vulnerability exists in the Aptsys POS Platform Web Services module thru 2025-05-28, which exposes internal API testing tools to unauthenticated users. By accessing specific URLs, an attacker is presented with a directory-style index listing all available backend services and POS web services, each with an HTML form for submitting test input. These panels are intended for developer use, but are accessible in production environments with no authentication or session validation. This grants any external actor the ability to discover, test, and execute API endpoints that perform critical functions including but not limited to user transaction retrieval, credit adjustments, POS actions, and internal data queries.

Analysis

Aptsys POS Platform Web Services module exposes internal API testing endpoints to the public, allowing unauthenticated access to point-of-sale backend systems.

Technical Context

The Aptsys POS Platform has internal API testing endpoints exposed without authentication (CWE-306), providing direct access to POS backend functionality including payment processing and order management.

Affected Products

['Aptsys POS Platform (gemscms)']

Remediation

Disable testing endpoints in production. Implement authentication on all API endpoints. Conduct PCI DSS compliance review.

Priority Score

47
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +47
POC: 0

Share

CVE-2025-52024 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy