CVE-2026-22315
Description
Incorrect Privilege Assignment vulnerability in Mesalvo Meona Client Launcher Component, Mesalvo Meona Server Component enables the export of user data, including cleartext passwords, via the SQL editor. This issue affects Meona Client Launcher Component: through 19.06.2020 15:11:49; Meona Server Component: through 2025.04 5+323020.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An incorrect privilege assignment in Meona allows exporting user data including cleartext passwords via the SQL editor.
Vulnerability
CVE-2026-22315 is an incorrect privilege assignment vulnerability in the Mesalvo Meona Client Launcher Component (through version 19.06.2020 15:11:49) and the Meona Server Component (through version 2025.04 5+323020). The backend server does not verify user permissions, enabling users with regular credentials to access the admin panel and use the SQL editor. This allows exporting user data, including cleartext passwords [1].
Exploitation
An attacker with only regular (non-admin) credentials can access the admin panel due to the lack of server-side permission verification [1]. Once inside the admin interface, the SQL editor is accessible, allowing the attacker to execute queries that export user data, including cleartext passwords. No additional privileges or special network access beyond standard HTTP connectivity to the backend are required [1].
Impact
Successful exploitation results in the disclosure of cleartext user passwords and other sensitive user data. This information disclosure can lead to unauthorized access to patient data, lateral movement within the application, and other malicious actions [1]. The attacker gains a significant advantage by obtaining credentials in plaintext.
Mitigation
Mesalvo has not yet released a public patch for the affected versions. Users should monitor vendor advisories for updates and apply patches when available. As a workaround, restrict network access to the Meona server to trusted hosts and enforce strict access controls. Note that this vulnerability is not listed in CISA KEV at the time of writing [1].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=19.06.2020 15:11:49
- Range: <=2025.04 5+323020
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.