Skip to main content
MemCyber
Critical CVSS 9.3 Admin Panel Exposure Responsible Disclosure

Disclosure

— CVSS 10.0 — PROD PostgreSQL Direkt Erişim (12 Veritabanı)

Finding 1 — CVSS 10.0 — PROD PostgreSQL Direkt Erişim (12 Veritabanı) Endpoint: `[ip]:5432` (GCP Cloud SQL `[redacted]-prd`, europe-west2) — TCP AÇIK Credentials: `[redacted]-prd:idC4KeJkaaN!AoNp` Kaynak: `[redacted]-ccee8_cloudbuild/source/.tgz` → `prd.yml` CI/CD arşivi

Target
African Remittance Provider
Category
Admin Panel Exposure
Channel
Responsible Disclosure
Disclosed
2026-04

Redaction note

Vendor identity withheld.

This finding is documented here as part of MemCyber’s public disclosure record. The vendor has been anonymized to a sector and region descriptor. Full technical detail — including root cause, reproducible proof-of-concept, remediation guidance, and vendor attribution where granted — is available to qualified prospects under NDA.

Coordinated disclosure

How we handled it.

  • Reported to the vendor via Responsible Disclosure with a reproducible proof-of-concept.
  • Triage + remediation window coordinated with the vendor security team.
  • Fix verified before any public reference.
  • This record published only after the embargo period closed.

Similar category

Want the full technical detail?

Named vendor, PoC, remediation — shared under NDA.