CVE-2025-25570
Published: 27 February 2025
Summary
CVE-2025-25570 is a critical-severity Insufficiently Protected Credentials (CWE-522) vulnerability. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 4.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-2 (Account Management) and IA-5 (Authenticator Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
IA-5 mandates proper management of authenticators including changing defaults and protecting from unauthorized disclosure, directly preventing hardcoded credentials that enable unauthorized backend login.
AC-2 requires management of accounts including disabling unnecessary or default accounts, mitigating hardcoded credential accounts in Vue Vben Admin.
SI-2 requires timely identification and remediation of flaws such as hardcoded credentials, preventing exploitation of this authentication bypass vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Hardcoded credentials enable remote unauthorized access to the public-facing admin interface (T1190) by abusing embedded valid/default credentials (T1078.001) for initial access without authentication.
NVD Description
Vue Vben Admin 2.10.1 allows unauthorized login to the backend due to an issue with hardcoded credentials.
Deeper analysisAI
CVE-2025-25570 is a critical authentication bypass vulnerability in Vue Vben Admin version 2.10.1, stemming from hardcoded credentials that enable unauthorized login to the backend management interface. This issue maps to CWE-522 (Insufficiently Protected Credentials) and CWE-798 (Use of Hard-coded Credentials), earning a CVSS v3.1 base score of 9.8 due to its network accessibility, low attack complexity, and lack of prerequisites like privileges or user interaction.
Remote attackers require only network access to the affected instance, with no authentication or special privileges needed to exploit the flaw. Successful exploitation grants full backend access, allowing high-impact compromise of confidentiality (e.g., data exfiltration), integrity (e.g., data tampering), and availability (e.g., service disruption).
Mitigation details and advisories are referenced in the GitHub repository at https://github.com/Hackerhan/Vben-Admin, where security practitioners should check for patches, updates, or remediation guidance specific to Vue Vben Admin 2.10.1.
Details
- CWE(s)