Cyber Posture

CVE-2025-12059

Critical

Published: 11 February 2026

Published
11 February 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0006 19.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-12059 is a critical-severity Insertion of Sensitive Information into Externally-Accessible File or Directory (CWE-538) vulnerability in Gov (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 19.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and CM-6 (Configuration Settings).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly enforces approved authorizations on files and directories to prevent unauthorized external access exploiting misconfigured access control security levels.

prevent

Ensures access control configurations are set to the most restrictive modes consistent with requirements, mitigating the incorrect security level configurations that expose sensitive information.

prevent

Identifies and applies the vendor-recommended upgrade to remediate the software flaw allowing insertion of sensitive data into externally accessible locations.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Direct unauthenticated remote exploitation of a public-facing application due to access control misconfiguration exposing sensitive files/directories.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in Logo Software Industry and Trade Inc. Logo j-Platform allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Logo j-Platform: from 3.29.6.4 before 3.34.8.9.

Deeper analysisAI

CVE-2025-12059 is an Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability (CWE-538) in Logo Software Industry and Trade Inc.'s Logo j-Platform. The flaw allows exploitation of incorrectly configured access control security levels, enabling sensitive data exposure. It affects Logo j-Platform versions from 3.29.6.4 before 3.34.8.9 and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Remote, unauthenticated attackers can exploit this vulnerability over the network with low attack complexity and without requiring user interaction. Successful exploitation results in high impacts to confidentiality, integrity, and availability, potentially allowing full compromise of affected systems.

Mitigation requires upgrading to Logo j-Platform version 3.34.8.9 or later. Further details are provided in the advisory at https://www.usom.gov.tr/bildirim/tr-26-0061.

Details

CWE(s)

Affected Products

Gov
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2019-25706Shared CWE-538
CVE-2023-54346Shared CWE-538
CVE-2026-21672Shared CWE-538
CVE-2016-20024Shared CWE-538
CVE-2020-37104Shared CWE-538
CVE-2025-11079Shared CWE-538

References