CVE-2025-54791: OMERO.web displays unecessary user information when requesting password reset
5.3
Basic Information
Technical Details
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| omero-web | pip | <= 5.29.1 | 5.29.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability lies in the handling of error messages during the password reset process in OMERO.web. The provided commit patch clearly shows that the getGuestConnection function in omeroweb/webadmin/views.py was modified to address this issue. Previously, the function would catch a omero.CmdError and then attempt to extract a specific error message from the exception's parameters. This could lead to the disclosure of sensitive user information if the exception contained such details. The fix replaces this logic with a static, generic error message, ensuring that no potentially sensitive information is ever displayed to the user. Therefore, the getGuestConnection function is the identified vulnerable function as it was responsible for generating and displaying the insecure error message.