Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Flaws in Software Used by Hundreds of Cities and Towns Exposed Sensitive Data

Posted on August 20, 2025August 20, 2025 By CWS

Two doubtlessly critical vulnerabilities have been discovered by a researcher in accounting software program utilized by lots of of cities and cities.

The affected software is made by Workhorse Software program Companies, which supplies software program options to 310 municipalities in Wisconsin. The seller has launched patches and mitigations after being notified.

The vulnerabilities, found by researcher James Harrold of Sparrow IT Options, had been disclosed this week by the CERT Coordination Middle (CERT/CC) at Carnegie Mellon College. 

One of many flaws, tracked as CVE-2025-9037, is an data publicity concern associated to SQL server connection credentials being saved in a plaintext file that’s sometimes in a shared community folder.

The second concern, CVE-2025-9040, is expounded to the supply of a database backup characteristic accessible from the login display that permits the creation of an unencrypted database backup file, which might later be restored on any SQL server with out a password.

This database backup might be copied by anybody with bodily entry to the machine working the Workhorse software program, or by malware current on the system.

“An attacker may receive the entire database, doubtlessly exposing delicate personally identifiable data (PII) comparable to Social Safety numbers, full municipal monetary data, and different confidential knowledge,” CERT/CC stated. “Possession of a database backup may additionally allow knowledge tampering, doubtlessly undermining audit trails and compromising the integrity of municipal monetary operations.”

Model 1.9.4.48019 patches the vulnerabilities and mitigations are additionally obtainable. Along with releasing patches and mitigations, Workhorse identified that clients have been accountable for the SQL authentication methodology utilized by the software program, and the problematic backup performance has all the time been non-obligatory. Commercial. Scroll to proceed studying.

Associated: Flaws in Gigabyte Firmware Permit Safety Bypass, Backdoor Deployment

Associated: ‘MadeYouReset’ HTTP2 Vulnerability Permits Huge DDoS Assaults

Associated: Unpatched Ruckus Vulnerabilities Permit Wi-fi Surroundings Hacking

Security Week News Tags:Cities, Data, Exposed, Flaws, Hundreds, Sensitive, Software, Towns

Post navigation

Previous Post: RingReaper Malware Attacking Linux Servers Evading EDR Solutions
Next Post: Discover and Control Shadow AI Agents in Your Enterprise Before Hackers Do

Related Posts

TikTok Faces Fresh European Privacy Investigation Over China Data Transfers Security Week News
NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch Security Week News
Microsoft Offers $5 Million at Zero Day Quest Hacking Contest Security Week News
Google Sues Operators of 10-Million-Device Badbox 2.0 Botnet Security Week News
IoT Security Firm Exein Raises $81 Million  Security Week News
TrustCloud Raises $15 Million for Security Assurance Platform Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare
  • Elastic Refutes Claims of Zero-Day in EDR Product

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare
  • Elastic Refutes Claims of Zero-Day in EDR Product

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News