M/Monit 3.7.4 contains an authentication vulnerability that allows authenticated attackers to retrieve user password hashes through an administrative API endpoint. Attackers can send requests to the /api/1/admin/users/list and /api/1/admin/users/get endpoints to extract MD5 password hashes for all users.
References
| Link | Resource |
|---|---|
| https://mmonit.com/ | Product |
| https://www.exploit-db.com/exploits/49081 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/mmonit-password-disclosure | Third Party Advisory |
Configurations
History
03 Feb 2026, 15:42
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Tildeslash
Tildeslash m\/monit |
|
| References | () https://mmonit.com/ - Product | |
| References | () https://www.exploit-db.com/exploits/49081 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/mmonit-password-disclosure - Third Party Advisory | |
| CPE | cpe:2.3:a:tildeslash:m\/monit:3.7.4:*:*:*:*:*:*:* |
Information
Published : 2026-01-28 18:16
Updated : 2026-02-03 15:42
NVD link : CVE-2020-36968
Mitre link : CVE-2020-36968
CVE.ORG link : CVE-2020-36968
JSON object : View
Products Affected
tildeslash
- m\/monit
CWE
CWE-522
Insufficiently Protected Credentials
