Solstice Pod API (version 5.5, 6.2) contains an unauthenticated API endpoint (`/api/config`) that exposes sensitive information such as the session key, server version, product details, and display name. Unauthorized users can extract live session information by accessing this endpoint without authentication.
References
| Link | Resource |
|---|---|
| https://documentation.mersive.com/en/solstice/about-solstice.html | Product |
| https://www.exploit-db.com/exploits/52104 | Exploit Third Party Advisory |
| https://www.mersive.com/ | Product |
| https://www.vulncheck.com/advisories/solstice-pod-api-session-key-extraction-via-api-endpoint | Third Party Advisory |
| https://www.exploit-db.com/exploits/52104 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-04 21:16
Updated : 2025-12-23 00:09
NVD link : CVE-2025-66573
Mitre link : CVE-2025-66573
CVE.ORG link : CVE-2025-66573
JSON object : View
Products Affected
mersive
- solstice_pod_firmware
- solstice_pod
CWE
CWE-319
Cleartext Transmission of Sensitive Information
