Cyber Posture

CVE-2025-11899

High

Published: 17 October 2025

Published
17 October 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0012 30.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-11899 is a high-severity Use of Hard-coded Cryptographic Key (CWE-321) vulnerability in Org (inferred from references). Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 30.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SC-12 (Cryptographic Key Establishment and Management).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates proper establishment and management of cryptographic keys, preventing the use of hard-coded keys that enable attackers to generate valid verification information for impersonation.

prevent

Requires management and protection of authenticators, including cryptographic keys used for user verification, to block exploitation via fixed keys for unauthorized logins.

prevent

Ensures timely identification, assessment, and remediation of software flaws like hard-coded cryptographic keys, directly addressing this CVE before exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability enables unauthenticated remote exploitation of a public-facing application (Agentflow) via a hard-coded cryptographic key to impersonate any user and gain unauthorized access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Agentflow developed by Flowring has an Use of Hard-coded Cryptographic Key vulnerability, allowing unauthenticated remote attackers to exploit the fixed key to generate verification information, thereby logging into the system as any user. Attacker must first obtain an user ID…

more

in order to exploit this vulnerability.

Deeper analysisAI

CVE-2025-11899 is a Use of Hard-coded Cryptographic Key vulnerability (CWE-321) in Agentflow, a product developed by Flowring. Published on 2025-10-17, it carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to network accessibility, high attack complexity, no required privileges or user interaction, and high impacts across confidentiality, integrity, and availability.

Unauthenticated remote attackers can exploit this vulnerability by first obtaining a user ID, then leveraging the fixed cryptographic key to generate valid verification information. This allows them to log into the Agentflow system as any user, potentially enabling full unauthorized access to the targeted environment.

Mitigation details are available in advisories from TWCERT, including https://www.twcert.org.tw/en/cp-139-10439-0bd15-2.html and https://www.twcert.org.tw/tw/cp-132-10438-1173e-1.html.

Details

CWE(s)

Affected Products

Org
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-15016Shared CWE-321
CVE-2026-22586Shared CWE-321
CVE-2025-57174Shared CWE-321
CVE-2025-62581Shared CWE-321
CVE-2026-26335Shared CWE-321
CVE-2025-8625Shared CWE-321
CVE-2025-34215Shared CWE-321
CVE-2025-27674Shared CWE-321
CVE-2025-41702Shared CWE-321
CVE-2026-5426Shared CWE-321

References