CVE-2025-25940
Published: 10 March 2025
Summary
CVE-2025-25940 is a critical-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Visicut Visicut. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 17.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely remediation of the insecure XML deserialization flaw in VisiCut's loadPlfFile method to eliminate arbitrary code execution.
Mandates validation of untrusted XML inputs prior to deserialization to block malicious payloads targeting the VisicutModel.java vulnerability.
Deploys memory protections such as DEP to prevent execution of arbitrary code resulting from insecure deserialization in VisiCut.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated arbitrary code execution via insecure XML deserialization directly enables exploitation of public-facing applications (T1190) and command/script execution on the target (T1059).
NVD Description
VisiCut 2.1 allows code execution via Insecure XML Deserialization in the loadPlfFile method of VisicutModel.java.
Deeper analysisAI
CVE-2025-25940 is a critical vulnerability in VisiCut 2.1 that enables arbitrary code execution through insecure XML deserialization in the loadPlfFile method of VisicutModel.java. The issue is classified under CWE-502 (Deserialization of Untrusted Data) and affects the VisiCut software component.
With a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), the vulnerability is exploitable remotely over the network by unauthenticated attackers with low complexity and no user interaction required. Successful exploitation allows attackers to achieve high-impact effects on confidentiality, integrity, and availability, including full code execution on the target system.
Advisories and mitigation guidance are provided at https://royblume.github.io/CVE-2025-25940/ and the VisiCut GitHub repository https://github.com/t-oster/VisiCut, published on 2025-03-10.
Details
- CWE(s)