CVE-2025-22973
Published: 20 February 2025
Summary
CVE-2025-22973 is a high-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability in Qibosoft Qibocms X1. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 29.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AU-13 (Monitoring for Information Disclosure) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-2 requires identification, reporting, and correction of the specific flaw in the http_curl() function that directly exposes sensitive URL response content.
SI-15 mandates filtering of information outputs to prevent exposure of sensitive data retrieved and returned by the vulnerable http_curl() function.
AU-13 provides monitoring specifically for unauthorized information disclosures like those triggered by exploitation of the http_curl() vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability in public-facing web app allows remote unauthenticated exploitation for sensitive data disclosure from internal responses, directly mapping to T1190 for initial access and T1005 for collecting data from local system sources.
NVD Description
An issue in QiboSoft QiboCMS X1.0 allows a remote attacker to obtain sensitive information via the http_curl() function in the '/application/common. php' file that directly retrieves the URL request response content.
Deeper analysisAI
CVE-2025-22973 is an information disclosure vulnerability in QiboSoft QiboCMS version X1.0. The flaw occurs in the http_curl() function within the '/application/common.php' file, which directly retrieves and exposes the response content of URL requests. This issue is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), reflecting high confidentiality impact with no impairment to integrity or availability.
A remote attacker can exploit this vulnerability over the network with low attack complexity, requiring no authentication privileges or user interaction. Exploitation involves triggering the http_curl() function to elicit responses that disclose sensitive information, such as internal application data or external service responses unintended for public exposure.
Mitigation guidance and additional details are available in the advisory referenced at https://github.com/202110420106/CVE/blob/master/CVE-2025-22973.md, published on 2025-02-20.
Details
- CWE(s)