Cyber Posture

CVE-2025-25570

Critical

Published: 27 February 2025

Published
27 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.2057 95.6th percentile
Risk Priority 32 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-25570 is a critical-severity Insufficiently Protected Credentials (CWE-522) vulnerability. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 4.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-2 (Account Management) and IA-5 (Authenticator Management).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

IA-5 mandates proper management of authenticators including changing defaults and protecting from unauthorized disclosure, directly preventing hardcoded credentials that enable unauthorized backend login.

prevent

AC-2 requires management of accounts including disabling unnecessary or default accounts, mitigating hardcoded credential accounts in Vue Vben Admin.

prevent

SI-2 requires timely identification and remediation of flaws such as hardcoded credentials, preventing exploitation of this authentication bypass vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1078.001 Default Accounts Stealth
Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Why these techniques?

Hardcoded credentials enable remote unauthorized access to the public-facing admin interface (T1190) by abusing embedded valid/default credentials (T1078.001) for initial access without authentication.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Vue Vben Admin 2.10.1 allows unauthorized login to the backend due to an issue with hardcoded credentials.

Deeper analysisAI

CVE-2025-25570 is a critical authentication bypass vulnerability in Vue Vben Admin version 2.10.1, stemming from hardcoded credentials that enable unauthorized login to the backend management interface. This issue maps to CWE-522 (Insufficiently Protected Credentials) and CWE-798 (Use of Hard-coded Credentials), earning a CVSS v3.1 base score of 9.8 due to its network accessibility, low attack complexity, and lack of prerequisites like privileges or user interaction.

Remote attackers require only network access to the affected instance, with no authentication or special privileges needed to exploit the flaw. Successful exploitation grants full backend access, allowing high-impact compromise of confidentiality (e.g., data exfiltration), integrity (e.g., data tampering), and availability (e.g., service disruption).

Mitigation details and advisories are referenced in the GitHub repository at https://github.com/Hackerhan/Vben-Admin, where security practitioners should check for patches, updates, or remediation guidance specific to Vue Vben Admin 2.10.1.

Details

CWE(s)

CVEs Like This One

CVE-2026-25202Shared CWE-798
CVE-2024-8893Shared CWE-798
CVE-2026-3873Shared CWE-798
CVE-2026-1221Shared CWE-798
CVE-2024-57040Shared CWE-798
CVE-2025-67418Shared CWE-798
CVE-2025-10850Shared CWE-798
CVE-2025-9497Shared CWE-798
CVE-2026-22769Shared CWE-798
CVE-2026-2616Shared CWE-798

References