Web-Based Server Management Platform Vulnerability in Termix by LukeGus
CVE-2025-59951

9.2CRITICAL

Key Information:

Vendor

Lukegus

Status
Vendor
CVE Published:
1 October 2025

What is CVE-2025-59951?

The web-based server management platform, Termix, is susceptible to an authentication bypass vulnerability due to improper handling of IP addresses when configured with an Nginx reverse proxy. In versions 1.5.0 and below, this misconfiguration leads to the backend reporting the proxy's IP instead of the client's. As a result, access to the sensitive /ssh/db/host/internal endpoint can be gained without proper authentication, potentially exposing critical SSH host information, including usernames and passwords. Users leveraging the official Termix Docker image, custom images built from the Dockerfile, or using reverse proxy setups are vulnerable. The issue is addressed in version 1.6.0.

Affected Version(s)

Termix < 1.6.0

References

CVSS V4

Score:
9.2
Severity:
CRITICAL
Confidentiality:
High
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-59951 : Web-Based Server Management Platform Vulnerability in Termix by LukeGus