Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Coded Smorgasbord: High Strung

      September 26, 2025

      Chainguard launches trusted collection of verified JavaScript libraries

      September 26, 2025

      CData launches Connect AI to provide agents access to enterprise data sources

      September 26, 2025

      PostgreSQL 18 adds asynchronous I/O to improve performance

      September 26, 2025

      Distribution Release: Neptune 9.0

      September 25, 2025

      Distribution Release: Kali Linux 2025.3

      September 23, 2025

      Distribution Release: SysLinuxOS 13

      September 23, 2025

      Development Release: MX Linux 25 Beta 1

      September 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      PHP 8.5.0 RC 1 available for testing

      September 26, 2025
      Recent

      PHP 8.5.0 RC 1 available for testing

      September 26, 2025

      Terraform Code Generator Using Ollama and CodeGemma

      September 26, 2025

      Beyond Denial: How AI Concierge Services Can Transform Healthcare from Reactive to Proactive

      September 25, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Distribution Release: Neptune 9.0

      September 25, 2025
      Recent

      Distribution Release: Neptune 9.0

      September 25, 2025

      FOSS Weekly #25.39: Kill Switch Phones, LMDE 7, Zorin OS 18 Beta, Polybar, Apt History and More Linux Stuff

      September 25, 2025

      Distribution Release: Kali Linux 2025.3

      September 23, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-52572 – Hikka Telegram Userbot Remote Code Execution and Account Takeover Vulnerability

    CVE-2025-52572 – Hikka Telegram Userbot Remote Code Execution and Account Takeover Vulnerability

    June 24, 2025

    CVE ID : CVE-2025-52572

    Published : June 24, 2025, 9:15 p.m. | 4 hours, 14 minutes ago

    Description : Hikka, a Telegram userbot, has vulnerability affects all users on all versions of Hikka. Two scenarios are possible. 1. Web interface does not have an authenticated session: attacker can use his own Telegram account to gain RCE to the server by authorizing in the dangling web interface. 2. Web interface does have an authenticated session: due to insufficient warning in the authentication message, users were tempted to click “Allow” in the “Allow web application ops” menu. This gave an attacker access not only to remote code execution, but also to Telegram accounts of owners. Scenario number 2 is known to have been exploited in the wild. No known patches are available, but some workarounds are available. Use `–no-web` flag and do not start userbot without it; after authorizing in the web interface, close the port on the server and/or start the userbot with `–no-web` flag; and do not click “Allow” in your helper bot unless it is your explicit action that needs to be allowed.

    Severity: 10.0 | CRITICAL

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-52883 – Meshtastic-Android PKC Impersonation Vulnerability
    Next Article TeamViewer Remote Management Bug (CVE-2025-36537) Enables Privilege Escalation

    Related Posts

    Development

    Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories

    September 14, 2025
    Development

    Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass

    September 14, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-6264 – Velociraptor Unauthorized Artifact Collection and Execution Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    RLHF 101: A Technical Tutorial on Reinforcement Learning from Human Feedback

    Machine Learning

    CVE-2025-46381 – Apache HTTP Server Command Injection

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-4735 – Campcodes Sales and Inventory System Unrestricted File Upload Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-55285 – Backstage Plugin Scaffolder Backend Information Disclosure

    August 15, 2025

    CVE ID : CVE-2025-55285

    Published : Aug. 15, 2025, 6:15 p.m. | 7 hours, 6 minutes ago

    Description : @backstage/plugin-scaffolder-backend is the backend for the default Backstage software templates. Prior to version 2.1.1, duplicate logging of the input values in the fetch:template action in the Scaffolder meant that some of the secrets were not properly redacted. If ${{ secrets.x }} is not passed through to fetch:template there is no impact. This issue has been resolved in 2.1.1 of the scaffolder-backend plugin. A workaround for this issue involves Template Authors removing the use of ${{ secrets }} being used as an argument to fetch:template.

    Severity: 2.6 | LOW

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Solo.io launches MCP Gateway to tackle AI agent sprawl

    April 3, 2025

    Microsoft Copilot returns to its Bing roots with major search overhaul

    April 4, 2025

    CVE-2025-50477 – Lbry-Desktop URL Redirection Vulnerability

    July 23, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.