CVE-2025-0473
Published: 16 January 2025
Summary
CVE-2025-0473 is a medium-severity Incomplete Cleanup (CWE-459) vulnerability in Sigb Pmb. Its CVSS base score is 6.5 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Local Data Staging (T1074.001); ranked at the 31.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-14 (Non-persistence) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents persistence of temporary files by enforcing non-persistence requirements on uploaded files at the vulnerable endpoint.
Enforces authorized access to temporary file storage locations, mitigating unauthorized read access to persisted sensitive files.
Monitors the file system for indicators of exploitation, such as orphaned temporary files from incomplete upload workflows.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vuln allows uploaded files to persist by omitting cleanup POST, directly enabling local staging of transferred tools/data.
NVD Description
Vulnerability in the PMB platform that allows an attacker to persist temporary files on the server, affecting versions 4.0.10 and above. This vulnerability exists in the file upload functionality on the ‘/pmb/authorities/import/iimport_authorities’ endpoint. When a file is uploaded via this…
more
resource, the server will create a temporary file that will be deleted after the client sends a POST request to ‘/pmb/authorities/import/iimport_authorities’. This workflow is automated by the web client, however an attacker can trap and launch the second POST request to prevent the temporary file from being deleted.
Deeper analysisAI
CVE-2025-0473 is a vulnerability in the PMB platform that enables an attacker to persist temporary files on the server, affecting versions 4.0.10 and above. The issue resides in the file upload functionality at the '/pmb/authorities/import/iimport_authorities' endpoint. During the normal workflow, a file upload creates a temporary file on the server, which is subsequently deleted after the client sends a follow-up POST request to the same endpoint. This process is automated by the web client, but it can be disrupted by an attacker.
The vulnerability has a CVSS v3.1 base score of 6.5 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N), indicating network accessibility with low attack complexity, requiring low privileges, no user interaction, and unchanged scope, primarily impacting confidentiality. An authenticated attacker with low privileges can exploit this by intercepting and delaying or omitting the second POST request, preventing the automatic deletion of the temporary file and allowing persistent storage of potentially sensitive uploaded content on the server.
The INCIBE advisory at https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-pmb-platform documents this as one of multiple vulnerabilities in the PMB platform.
Details
- CWE(s)