CVE-2025-25382
Published: 10 March 2025
Summary
CVE-2025-25382 is a high-severity External Control of Assumed-Immutable Web Parameter (CWE-472) vulnerability in Ikm Sanchaya. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 40.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and IA-8 (Identification and Authentication (Non-organizational Users)).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of user-supplied information inputs like payment amounts, preventing external control of assumed-immutable web parameters via crafted requests.
Limits and authorizes specific actions performable without identification or authentication, preventing unauthenticated attackers from modifying payment amounts.
Mandates identification and authentication for non-organizational users accessing the public payment portal, blocking unauthenticated crafted requests.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability in public-facing payment portal enables exploitation (T1190) to manipulate transmitted payment data (T1565.002), facilitating financial theft (T1657) via crafted requests.
NVD Description
An issue in the Property Tax Payment Portal in Information Kerala Mission SANCHAYA v3.0.4 allows attackers to arbitrarily modify payment amounts via a crafted request.
Deeper analysisAI
CVE-2025-25382 is a vulnerability in the Property Tax Payment Portal of Information Kerala Mission's SANCHAYA v3.0.4, published on 2025-03-10. The issue, tied to CWE-472 (External Control of Assumed-Immutable Web Parameter), enables attackers to arbitrarily modify payment amounts through a crafted request. It carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N), indicating high integrity impact with no confidentiality or availability effects.
Unauthenticated attackers with network access can exploit this vulnerability with low complexity and no user interaction required. By sending a specially crafted request to the portal, they can alter payment amounts, potentially enabling fraudulent transactions such as underpaying property taxes or manipulating financial records in the system.
Advisories reference a GitHub repository at https://github.com/edwin-0990/CVE_ID/blob/main/CVE-2025-25382/README.md for technical details and proof-of-concept, along with the affected portal at https://tax.lsgkerala.gov.in/epayment/QuickPaySearch.php. No specific patches or mitigations are detailed in the provided information.
Details
- CWE(s)