CVE-2025-10452
Published: 15 September 2025
Summary
CVE-2025-10452 is a critical-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Org (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 41.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly identifies, authorizes, and limits actions performable without identification or authentication, preventing unauthenticated high-privilege database access.
Enforces security measures to prevent remote unauthenticated entities from accessing publicly accessible services, mitigating network-based exploitation of the database system.
Enforces approved authorizations for logical access to system resources, ensuring authentication checks block unauthorized read, modify, and delete operations.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Missing authentication (CWE-306) on public-facing database system directly enables remote exploitation for initial access (T1190) and unauthorized database data access/manipulation (T1213.006).
NVD Description
Statistical Database System developed by Gotac has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read, modify, and delete database contents with high-level privileges.
Deeper analysisAI
CVE-2025-10452 is a Missing Authentication vulnerability (CWE-306) affecting the Statistical Database System developed by Gotac. Published on 2025-09-15T03:15:40.707, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The issue enables unauthenticated remote attackers to read, modify, and delete database contents with high-level privileges.
Unauthenticated remote attackers can exploit this vulnerability over the network with low complexity and no required privileges or user interaction. Successful exploitation provides high-level database privileges, allowing full compromise of confidentiality through unauthorized reads, integrity via modifications, and availability through deletions.
Advisories from Taiwan's CERT (TWCERT) provide further details on this vulnerability, available at https://www.twcert.org.tw/en/cp-139-10380-1ce73-2.html and https://www.twcert.org.tw/tw/cp-132-10379-70d40-1.html.
Details
- CWE(s)