Cyber Posture

CVE-2025-25940

CriticalPublic PoCRCE

Published: 10 March 2025

Published
10 March 2025
Modified
23 June 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0163 82.1th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-25940 is a critical-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Visicut Visicut. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 17.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely remediation of the insecure XML deserialization flaw in VisiCut's loadPlfFile method to eliminate arbitrary code execution.

prevent

Mandates validation of untrusted XML inputs prior to deserialization to block malicious payloads targeting the VisicutModel.java vulnerability.

prevent

Deploys memory protections such as DEP to prevent execution of arbitrary code resulting from insecure deserialization in VisiCut.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Remote unauthenticated arbitrary code execution via insecure XML deserialization directly enables exploitation of public-facing applications (T1190) and command/script execution on the target (T1059).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

VisiCut 2.1 allows code execution via Insecure XML Deserialization in the loadPlfFile method of VisicutModel.java.

Deeper analysisAI

CVE-2025-25940 is a critical vulnerability in VisiCut 2.1 that enables arbitrary code execution through insecure XML deserialization in the loadPlfFile method of VisicutModel.java. The issue is classified under CWE-502 (Deserialization of Untrusted Data) and affects the VisiCut software component.

With a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), the vulnerability is exploitable remotely over the network by unauthenticated attackers with low complexity and no user interaction required. Successful exploitation allows attackers to achieve high-impact effects on confidentiality, integrity, and availability, including full code execution on the target system.

Advisories and mitigation guidance are provided at https://royblume.github.io/CVE-2025-25940/ and the VisiCut GitHub repository https://github.com/t-oster/VisiCut, published on 2025-03-10.

Details

CWE(s)

Affected Products

visicut
visicut
2.1

CVEs Like This One

CVE-2025-23006Shared CWE-502
CVE-2026-22345Shared CWE-502
CVE-2025-42944Shared CWE-502
CVE-2025-29310Shared CWE-502
CVE-2024-9664Shared CWE-502
CVE-2025-1971Shared CWE-502
CVE-2025-2485Shared CWE-502
CVE-2024-13889Shared CWE-502
CVE-2026-24385Shared CWE-502
CVE-2025-60233Shared CWE-502

References