Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59951: CWE-348: Use of Less Trusted Source in LukeGus Termix

0
Critical
VulnerabilityCVE-2025-59951cvecve-2025-59951cwe-348cwe-284
Published: Wed Oct 01 2025 (10/01/2025, 21:52:01 UTC)
Source: CVE Database V5
Vendor/Project: LukeGus
Product: Termix

Description

Termix is a web-based server management platform with SSH terminal, tunneling, and file editing capabilities. The official Docker image for Termix versions 1.5.0 and below, due to being configured with an Nginx reverse proxy, causes the backend to retrieve the proxy's IP instead of the client's IP when using the req.ip method. This results in isLocalhost always returning True. Consequently, the /ssh/db/host/internal endpoint can be accessed directly without login or authentication. This endpoint records the system's stored SSH host information, including addresses, usernames, and passwords, posing an extremely high security risk. Users who use the official Termix docker image, build their own image using the official dockerfile, or utilize reverse proxy functionality will be affected by this vulnerability. This issue is fixed in version 1.6.0.

AI-Powered Analysis

AILast updated: 10/08/2025, 22:07:31 UTC

Technical Analysis

CVE-2025-59951 is a critical security vulnerability affecting Termix, a web-based server management tool that provides SSH terminal access, tunneling, and file editing. The vulnerability is rooted in the official Docker image for Termix versions 1.5.0 and below, which uses an Nginx reverse proxy configuration that causes the backend application to incorrectly identify the client IP address. Specifically, when the backend calls req.ip, it receives the proxy's IP instead of the actual client IP, causing the isLocalhost function to always return true. This logic flaw bypasses authentication checks for the /ssh/db/host/internal endpoint, which stores sensitive SSH host credentials such as IP addresses, usernames, and passwords. As a result, attackers can directly access this endpoint without any login or authentication, exposing critical secrets that can be leveraged to compromise managed servers. The vulnerability is classified under CWE-348 (Use of Less Trusted Source) and CWE-284 (Improper Access Control). The CVSS 4.0 score is 9.2 (critical), reflecting the ease of exploitation (no authentication or user interaction required), the high impact on confidentiality, and the broad scope of affected systems. Although no known exploits are currently reported in the wild, the severity and nature of the flaw make it a prime target for attackers. The issue is resolved in Termix version 1.6.0, which corrects the IP detection logic and enforces proper authentication for sensitive endpoints. Users deploying Termix via Docker or using reverse proxy setups should prioritize upgrading to the patched version and auditing their configurations to prevent unauthorized access.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of server management credentials. Exposure of SSH host information can lead to unauthorized access to critical infrastructure, data breaches, lateral movement within networks, and potential full system compromise. Organizations relying on Termix for managing multiple servers, especially in sectors like finance, healthcare, and government, face heightened risks due to the sensitive nature of their data and regulatory requirements such as GDPR. The ease of exploitation without authentication increases the likelihood of automated scanning and attacks, potentially resulting in widespread compromise. Additionally, the use of Docker and reverse proxies is common in modern European IT environments, amplifying the threat surface. Failure to patch or mitigate this vulnerability could lead to operational disruptions, reputational damage, and legal consequences under European data protection laws.

Mitigation Recommendations

1. Upgrade Termix installations to version 1.6.0 or later immediately to apply the official fix addressing the IP detection and authentication bypass. 2. Review and harden reverse proxy configurations, ensuring that the backend correctly identifies client IP addresses, for example by properly setting and validating X-Forwarded-For headers. 3. Implement network segmentation and access controls to restrict access to Termix management interfaces only to trusted internal networks or VPNs. 4. Enable logging and monitoring on Termix endpoints, especially /ssh/db/host/internal, to detect any unauthorized access attempts. 5. Avoid using the official Docker image without customization; consider building images with enhanced security configurations and minimal privileges. 6. Conduct regular audits of stored SSH credentials and rotate passwords or keys if exposure is suspected. 7. Employ multi-factor authentication and additional layers of access control around server management tools. 8. Educate DevOps and security teams about the risks of relying on less trusted sources for client identification in proxy environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-23T14:33:49.506Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68dda3ebe96067ff09c5f065

Added to database: 10/1/2025, 9:58:03 PM

Last enriched: 10/8/2025, 10:07:31 PM

Last updated: 11/17/2025, 10:10:28 AM

Views: 126

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats