CVE-2025-11899
Published: 17 October 2025
Summary
CVE-2025-11899 is a high-severity Use of Hard-coded Cryptographic Key (CWE-321) vulnerability in Org (inferred from references). Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 30.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SC-12 (Cryptographic Key Establishment and Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates proper establishment and management of cryptographic keys, preventing the use of hard-coded keys that enable attackers to generate valid verification information for impersonation.
Requires management and protection of authenticators, including cryptographic keys used for user verification, to block exploitation via fixed keys for unauthorized logins.
Ensures timely identification, assessment, and remediation of software flaws like hard-coded cryptographic keys, directly addressing this CVE before exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability enables unauthenticated remote exploitation of a public-facing application (Agentflow) via a hard-coded cryptographic key to impersonate any user and gain unauthorized access.
NVD Description
Agentflow developed by Flowring has an Use of Hard-coded Cryptographic Key vulnerability, allowing unauthenticated remote attackers to exploit the fixed key to generate verification information, thereby logging into the system as any user. Attacker must first obtain an user ID…
more
in order to exploit this vulnerability.
Deeper analysisAI
CVE-2025-11899 is a Use of Hard-coded Cryptographic Key vulnerability (CWE-321) in Agentflow, a product developed by Flowring. Published on 2025-10-17, it carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to network accessibility, high attack complexity, no required privileges or user interaction, and high impacts across confidentiality, integrity, and availability.
Unauthenticated remote attackers can exploit this vulnerability by first obtaining a user ID, then leveraging the fixed cryptographic key to generate valid verification information. This allows them to log into the Agentflow system as any user, potentially enabling full unauthorized access to the targeted environment.
Mitigation details are available in advisories from TWCERT, including https://www.twcert.org.tw/en/cp-139-10439-0bd15-2.html and https://www.twcert.org.tw/tw/cp-132-10438-1173e-1.html.
Details
- CWE(s)