Description
Nautobot is a Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. In Nautobot 2.0.x, certain REST API endpoints, in combination with the `?depth=<N>` query parameter, can expose hashed user passwords as stored in the database to any authenticated user with access to these endpoints. The passwords are not exposed in plaintext. This vulnerability has been patched in version 2.0.3.
References (3)
Core 3
Core References
Exploit, Patch, Vendor Advisory x_refsource_confirm
https://github.com/nautobot/nautobot/security/advisories/GHSA-r2hw-74xv-4gqp
Patch x_refsource_misc
https://github.com/nautobot/nautobot/pull/4692
Scores
CVSS v3
6.5
EPSS
0.0021
EPSS Percentile
43.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-200
CWE-312
Status
published
Products (2)
networktocode/nautobot
2.0.0 - 2.0.3
pypi/nautobot
2.0.0 - 2.0.3PyPI
Published
Oct 25, 2023
Tracked Since
Feb 18, 2026