Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1395: CWE-209 Generation of Error Message Containing Sensitive Information in Codriapp Innovation and Software Technologies Inc. HeyGarson

0
High
VulnerabilityCVE-2025-1395cvecve-2025-1395cwe-209
Published: Fri Jan 30 2026 (01/30/2026, 08:31:53 UTC)
Source: CVE Database V5
Vendor/Project: Codriapp Innovation and Software Technologies Inc.
Product: HeyGarson

Description

Generation of Error Message Containing Sensitive Information vulnerability in Codriapp Innovation and Software Technologies Inc. HeyGarson allows Fuzzing for application mapping.This issue affects HeyGarson: through 30012026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/30/2026, 09:12:21 UTC

Technical Analysis

CVE-2025-1395 identifies a vulnerability in the HeyGarson product by Codriapp Innovation and Software Technologies Inc., characterized by the generation of error messages that inadvertently disclose sensitive information (classified under CWE-209). This vulnerability enables attackers to perform fuzzing techniques remotely without authentication or user interaction, allowing them to map the application’s structure and potentially identify further weaknesses. The flaw affects all versions up to 30012026, and the vendor has not responded to early disclosure attempts, leaving no official patches available. The CVSS 3.1 score of 8.2 indicates a high-severity issue, primarily due to the vulnerability’s network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is predominantly on confidentiality, as sensitive data exposure can facilitate subsequent attacks, although integrity and availability impacts are low. The vulnerability’s exploitation scope is broad given the lack of authentication requirements and the ability to remotely probe the application. Despite no known exploits in the wild, the risk remains significant for organizations relying on HeyGarson, especially in environments where sensitive data confidentiality is paramount.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to confidentiality, as sensitive information leakage through error messages can expose internal application logic, configuration details, or user data. Such exposure can enable attackers to perform targeted attacks, including privilege escalation, data exfiltration, or further exploitation of the application. Industries handling sensitive personal data, intellectual property, or critical infrastructure information are particularly vulnerable. The lack of vendor patches increases the risk window, potentially leading to prolonged exposure. Additionally, the vulnerability could undermine trust in affected services and lead to regulatory compliance issues under GDPR if personal data is compromised. The ease of exploitation without authentication or user interaction means attackers can operate stealthily and at scale, increasing the threat to European enterprises using HeyGarson.

Mitigation Recommendations

Given the absence of vendor patches, European organizations should implement compensating controls immediately. These include restricting network access to HeyGarson instances via firewalls or VPNs to limit exposure to trusted users only. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block fuzzing patterns and anomalous error message requests. Enable detailed logging and monitoring to identify unusual access patterns or repeated error message generation attempts. Conduct internal code reviews or penetration testing to identify and remediate sensitive information leakage in error handling. Where possible, configure the application to suppress detailed error messages or redirect error outputs to secure logs inaccessible to external users. Educate developers and administrators on secure error handling practices to prevent similar issues in future deployments. Finally, maintain close monitoring of threat intelligence sources for any emerging exploits or vendor updates.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TR-CERT
Date Reserved
2025-02-17T12:37:53.583Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697c728bac06320222401f5d

Added to database: 1/30/2026, 8:57:47 AM

Last enriched: 1/30/2026, 9:12:21 AM

Last updated: 1/30/2026, 11:09:37 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats