{"uuid": "9dfcd285-d9d2-41b9-8d3e-2debea448fd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26658", "type": "seen", "source": "https://t.me/cvedetector/20015", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26658 - SAP Business One Session Hijacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26658 \nPublished : March 11, 2025, 1:15 a.m. | 24\u00a0minutes ago \nDescription : The Service Layer in SAP Business One, allows attackers to potentially gain unauthorized access and impersonate other users in the application to perform unauthorized actions. Due to the improper session management, the attackers can elevate themselves to higher privilege and can read, modify and/or write new data. To gain authenticated sessions of other users, the attacker must invest considerable time and effort. This vulnerability has a high impact on the confidentiality and integrity of the application with no effect on the availability of the application. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-11T03:24:35.000000Z"}