CVE-2025-25535
Published: 26 March 2025
Summary
CVE-2025-25535 is a critical-severity Incorrect Default Permissions (CWE-276) vulnerability in Com (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 21.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-7 (Boundary Protection) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the HTTP response manipulation vulnerability by remediating the specific flaw in SCRIPT CASE through patching or workarounds.
Enforces server-side validation of HTTP inputs to block crafted requests that manipulate responses and enable privilege escalation.
Deploys boundary protection mechanisms like web application firewalls to inspect and block malicious HTTP requests targeting the vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an unauthenticated remote exploit in a public-facing web application (SCRIPT CASE) that directly enables privilege escalation via crafted HTTP requests, mapping to T1190 (Exploit Public-Facing Application) for initial access and T1068 (Exploitation for Privilege Escalation) for the core impact.
NVD Description
HTTP Response Manipulation in SCRIPT CASE v.1.0.002 Build7 allows a remote attacker to escalate privileges via a crafted request.
Deeper analysisAI
CVE-2025-25535 is a critical HTTP response manipulation vulnerability affecting SCRIPT CASE version 1.0.002 Build7. It enables a remote attacker to escalate privileges through a specially crafted HTTP request, as indicated by its association with CWE-276. The vulnerability received a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), highlighting its severe potential impact due to high confidentiality, integrity, and availability consequences with no prerequisites for exploitation beyond network access.
Any unauthenticated remote attacker can exploit this vulnerability by sending a malicious HTTP request to a vulnerable SCRIPT CASE instance. Successful exploitation allows privilege escalation, potentially granting unauthorized high-level access to the application or underlying system, which could lead to full compromise including data exfiltration, modification, or disruption of services.
Advisories and additional details are available in referenced sources, including a GitHub research repository at https://github.com/simalamuel/Research/tree/main/CVE-2025-25535 and a BeSafe Brasil advisory at https://www.besafebrasil.com.br/script-case-cve-2025-xx-xxxx/, which may provide guidance on detection, patches, or workarounds.
Details
- CWE(s)