CVE-2025-22978
Published: 03 February 2025
Summary
CVE-2025-22978 is a critical-severity Injection (CWE-74) vulnerability in Eladmin Eladmin. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 33.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-2 requires timely flaw remediation, directly addressing the CSV injection vulnerability through application of the vendor patch in the exception log download module.
SI-15 mandates filtering of information outputs, preventing malicious payloads from being injected into CSV exception log downloads.
AC-14 restricts permitted actions without identification or authentication, blocking unauthenticated remote access to the vulnerable exception log download module.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE enables remote exploitation of public-facing web app to inject malicious payloads into downloadable CSV logs; when opened, this facilitates delivery and execution of malicious file on client system.
NVD Description
eladmin <=2.7 is vulnerable to CSV Injection in the exception log download module.
Deeper analysisAI
CVE-2025-22978 is a CSV Injection vulnerability affecting eladmin versions 2.7 and earlier, specifically in the exception log download module. Published on 2025-02-03, this issue falls under CWE-74 and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its potential for severe impacts across confidentiality, integrity, and availability.
Unauthenticated remote attackers can exploit this vulnerability over the network with low attack complexity and no user interaction required. Exploitation allows adversaries to inject malicious payloads into the CSV output, potentially leading to high-level compromise of systems that process the downloaded logs.
Mitigation is provided through a patch in the commit at https://github.com/elunez/eladmin/commit/d6a16e9afc0a3b96a56f1a24ed167e1beec6ce2f. Additional details on the vulnerability are documented in the GitHub issue at https://github.com/elunez/eladmin/issues/863.
Details
- CWE(s)