Cyber Posture

CVE-2025-25382

High

Published: 10 March 2025

Published
10 March 2025
Modified
23 June 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score 0.0019 40.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-25382 is a high-severity External Control of Assumed-Immutable Web Parameter (CWE-472) vulnerability in Ikm Sanchaya. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 40.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and IA-8 (Identification and Authentication (Non-organizational Users)).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of user-supplied information inputs like payment amounts, preventing external control of assumed-immutable web parameters via crafted requests.

prevent

Limits and authorizes specific actions performable without identification or authentication, preventing unauthenticated attackers from modifying payment amounts.

prevent

Mandates identification and authentication for non-organizational users accessing the public payment portal, blocking unauthenticated crafted requests.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1565.002 Transmitted Data Manipulation Impact
Adversaries may alter data en route to storage or other systems in order to manipulate external outcomes or hide activity, thus threatening the integrity of the data.
T1657 Financial Theft Impact
Adversaries may steal monetary resources from targets through extortion, social engineering, technical theft, or other methods aimed at their own financial gain at the expense of the availability of these resources for victims.
Why these techniques?

Vulnerability in public-facing payment portal enables exploitation (T1190) to manipulate transmitted payment data (T1565.002), facilitating financial theft (T1657) via crafted requests.

NVD Description

An issue in the Property Tax Payment Portal in Information Kerala Mission SANCHAYA v3.0.4 allows attackers to arbitrarily modify payment amounts via a crafted request.

Deeper analysisAI

CVE-2025-25382 is a vulnerability in the Property Tax Payment Portal of Information Kerala Mission's SANCHAYA v3.0.4, published on 2025-03-10. The issue, tied to CWE-472 (External Control of Assumed-Immutable Web Parameter), enables attackers to arbitrarily modify payment amounts through a crafted request. It carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N), indicating high integrity impact with no confidentiality or availability effects.

Unauthenticated attackers with network access can exploit this vulnerability with low complexity and no user interaction required. By sending a specially crafted request to the portal, they can alter payment amounts, potentially enabling fraudulent transactions such as underpaying property taxes or manipulating financial records in the system.

Advisories reference a GitHub repository at https://github.com/edwin-0990/CVE_ID/blob/main/CVE-2025-25382/README.md for technical details and proof-of-concept, along with the affected portal at https://tax.lsgkerala.gov.in/epayment/QuickPaySearch.php. No specific patches or mitigations are detailed in the provided information.

Details

CWE(s)

Affected Products

ikm
sanchaya
3.0.4

CVEs Like This One

CVE-2025-22384Shared CWE-472
CVE-2025-30236Shared CWE-472
CVE-2025-10891Shared CWE-472
CVE-2026-5908Shared CWE-472
CVE-2026-5912Shared CWE-472
CVE-2026-7896Shared CWE-472
CVE-2026-41353Shared CWE-472
CVE-2026-5277Shared CWE-472
CVE-2026-5909Shared CWE-472
CVE-2026-5274Shared CWE-472

References