Cyber Posture

CVE-2025-2395

Critical

Published: 17 March 2025

Published
17 March 2025
Modified
18 November 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0123 79.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-2395 is a critical-severity Reliance on Cookies without Validation and Integrity Checking (CWE-565) vulnerability in Edetw U-Office Force. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 20.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Explicitly identifies and limits actions allowable without authentication, precluding the vulnerable API endpoint from permitting unauthenticated cookie alteration for admin login.

prevent

Enforces approved access authorizations, blocking unauthenticated remote attackers from accessing the API to manipulate cookies and gain administrator privileges.

prevent

Requires robust identification and authentication for organizational users, preventing improper authentication bypass via API-driven cookie alteration to impersonate administrators.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1550.004 Web Session Cookie Lateral Movement
Adversaries can use stolen session cookies to authenticate to web applications and services.
Why these techniques?

Vulnerability enables unauthenticated remote exploitation of public-facing app API to manipulate cookies for admin impersonation, directly mapping to T1190 and facilitating T1550.004.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

The U-Office Force from e-Excellence has an Improper Authentication vulnerability, allowing unauthenticated remote attackers to use a particular API and alter cookies to log in as an administrator.

Deeper analysisAI

CVE-2025-2395 is an Improper Authentication vulnerability (CWE-565) affecting U-Office Force from e-Excellence. Published on 2025-03-17, it enables unauthenticated remote attackers to exploit a particular API endpoint and alter cookies to gain administrator login access. The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), classifying it as critical due to its high impact on confidentiality, integrity, and availability.

Unauthenticated remote attackers with network access can exploit this vulnerability without privileges, low attack complexity, or user interaction. Exploitation allows attackers to impersonate administrators by manipulating cookies via the API, potentially enabling full control over the affected system.

Mitigation details are outlined in advisories from TWCERT/CC, available at https://www.twcert.org.tw/en/cp-139-10012-d5bbc-2.html and https://www.twcert.org.tw/tw/cp-132-10011-3de72-1.html.

Details

CWE(s)

Affected Products

edetw
u-office force
≤ 28.0

CVEs Like This One

CVE-2026-3422Same product: Edetw U-Office Force
CVE-2025-2396Same product: Edetw U-Office Force
CVE-2025-12865Same product: Edetw U-Office Force
CVE-2025-12864Same product: Edetw U-Office Force
CVE-2025-64447Shared CWE-565
CVE-2014-125112Shared CWE-565
CVE-2025-14440Shared CWE-565
CVE-2022-50926Shared CWE-565
CVE-2025-65212Shared CWE-565
CVE-2026-5130Shared CWE-565

References