Cyber Posture

CVE-2025-22973

High

Published: 20 February 2025

Published
20 February 2025
Modified
18 June 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0011 29.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-22973 is a high-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability in Qibosoft Qibocms X1. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 29.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AU-13 (Monitoring for Information Disclosure) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

preventrecover

SI-2 requires identification, reporting, and correction of the specific flaw in the http_curl() function that directly exposes sensitive URL response content.

prevent

SI-15 mandates filtering of information outputs to prevent exposure of sensitive data retrieved and returned by the vulnerable http_curl() function.

detect

AU-13 provides monitoring specifically for unauthorized information disclosures like those triggered by exploitation of the http_curl() vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Vulnerability in public-facing web app allows remote unauthenticated exploitation for sensitive data disclosure from internal responses, directly mapping to T1190 for initial access and T1005 for collecting data from local system sources.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

An issue in QiboSoft QiboCMS X1.0 allows a remote attacker to obtain sensitive information via the http_curl() function in the '/application/common. php' file that directly retrieves the URL request response content.

Deeper analysisAI

CVE-2025-22973 is an information disclosure vulnerability in QiboSoft QiboCMS version X1.0. The flaw occurs in the http_curl() function within the '/application/common.php' file, which directly retrieves and exposes the response content of URL requests. This issue is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), reflecting high confidentiality impact with no impairment to integrity or availability.

A remote attacker can exploit this vulnerability over the network with low attack complexity, requiring no authentication privileges or user interaction. Exploitation involves triggering the http_curl() function to elicit responses that disclose sensitive information, such as internal application data or external service responses unintended for public exposure.

Mitigation guidance and additional details are available in the advisory referenced at https://github.com/202110420106/CVE/blob/master/CVE-2025-22973.md, published on 2025-02-20.

Details

CWE(s)

Affected Products

qibosoft
qibocms x1
all versions

CVEs Like This One

CVE-2025-24253Shared CWE-200
CVE-2026-39412Shared CWE-200
CVE-2024-55272Shared CWE-200
CVE-2025-26167Shared CWE-200
CVE-2026-4660Shared CWE-200
CVE-2026-2268Shared CWE-200
CVE-2025-27784Shared CWE-200
CVE-2025-8590Shared CWE-200
CVE-2026-24870Shared CWE-200
CVE-2024-57716Shared CWE-200

References