Skip to main content

CVE-2025-36759: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in SolaX Power SolaX Cloud

High
VulnerabilityCVE-2025-36759cvecve-2025-36759cwe-200
Published: Wed Sep 10 2025 (09/10/2025, 08:50:56 UTC)
Source: CVE Database V5
Vendor/Project: SolaX Power
Product: SolaX Cloud

Description

Through the provision of user names, SolaX Cloud will suggest (similar) user accounts and thereby leak sensitive information such as user email addresses and phone numbers.

AI-Powered Analysis

AILast updated: 09/10/2025, 09:15:11 UTC

Technical Analysis

CVE-2025-36759 is a high-severity vulnerability affecting SolaX Power's SolaX Cloud platform, identified as an exposure of sensitive information (CWE-200). The vulnerability arises from the platform's user account suggestion feature, which, upon receiving input of user names, returns similar user accounts. This behavior inadvertently leaks sensitive personal information, specifically user email addresses and phone numbers, to unauthorized actors. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:N). The impact is confined to confidentiality, with no direct effect on integrity or availability. The vulnerability affects all versions of SolaX Cloud prior to June 27, 2025. Although no known exploits are currently reported in the wild, the ease of exploitation and the nature of the leaked data pose significant privacy and security risks. Attackers can leverage this information for targeted phishing, social engineering, or further attacks against users or the organization. The vulnerability does not require any privileges or user interaction, increasing the risk of automated or large-scale data harvesting. No official patch links are provided yet, indicating that remediation may still be pending or in progress.

Potential Impact

For European organizations using SolaX Cloud, this vulnerability presents a substantial risk to user privacy and data protection compliance, particularly under GDPR regulations. The leakage of email addresses and phone numbers can lead to increased phishing attacks, identity theft, and reputational damage. Organizations relying on SolaX Cloud for energy management or monitoring may face indirect operational risks if attackers use the leaked information to target employees or customers. The exposure of personal data could also result in regulatory fines and legal consequences. Given the critical role of energy infrastructure and the increasing integration of cloud-based management systems in Europe, this vulnerability could undermine trust in smart energy solutions and complicate compliance efforts. The absence of authentication and user interaction requirements means attackers can exploit this vulnerability at scale, potentially affecting large user bases across multiple organizations.

Mitigation Recommendations

European organizations should immediately verify their use of SolaX Cloud and identify affected versions prior to 27 June 2025. Until an official patch is released, organizations should implement network-level controls such as IP whitelisting or VPN access to restrict access to the SolaX Cloud platform. Monitoring and logging of access patterns should be enhanced to detect unusual querying behavior indicative of enumeration attacks. User education on phishing risks should be intensified, given the potential for harvested contact information to be used in social engineering. Organizations should engage with SolaX Power for timely updates and apply patches as soon as they become available. Additionally, consider implementing rate limiting or CAPTCHA mechanisms at the application layer to reduce automated exploitation risks. Where possible, review and adjust privacy settings or disable the user account suggestion feature until the vulnerability is remediated. Finally, conduct a thorough audit of exposed user data and notify affected users in compliance with GDPR breach notification requirements.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
DIVD
Date Reserved
2025-04-15T21:54:36.815Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c13e20e55cc6e90da004a4

Added to database: 9/10/2025, 9:00:16 AM

Last enriched: 9/10/2025, 9:15:11 AM

Last updated: 9/10/2025, 11:15:49 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats