A vulnerability in the PHP backend of gemsloyalty.aptsys.com.sg thru 2025-05-28 allows unauthenticated remote attackers to trigger detailed error messages that disclose internal file paths, code snippets, and stack traces. This occurs when specially crafted HTTP GET/POST requests are sent to public API endpoints, exposing potentially sensitive information useful for further exploitation. This issue is classified under CWE-209: Information Exposure Through an Error Message.
History

Mon, 26 Jan 2026 17:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-209
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Aptsys
Aptsys gemsloyalty
Vendors & Products Aptsys
Aptsys gemsloyalty

Fri, 23 Jan 2026 20:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the PHP backend of gemsloyalty.aptsys.com.sg thru 2025-05-28 allows unauthenticated remote attackers to trigger detailed error messages that disclose internal file paths, code snippets, and stack traces. This occurs when specially crafted HTTP GET/POST requests are sent to public API endpoints, exposing potentially sensitive information useful for further exploitation. This issue is classified under CWE-209: Information Exposure Through an Error Message.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2026-01-23T00:00:00.000Z

Updated: 2026-01-26T16:57:07.721Z

Reserved: 2025-06-16T00:00:00.000Z

Link: CVE-2025-52022

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-23T21:15:49.673

Modified: 2026-01-26T17:16:10.280

Link: CVE-2025-52022

cve-icon Redhat

No data.