CVE-2025-25951
Published: 03 March 2025
Summary
CVE-2025-25951 is a high-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability in Serosoft Academia Student Information System. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 39.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for logical access, preventing unauthenticated attackers from accessing sensitive user information via the /rest/cb/executeBasicSearch endpoint.
Identifies and restricts specific actions permitted without identification or authentication, directly mitigating unauthorized disclosure through the vulnerable unauthenticated endpoint.
Monitors systems for information disclosure events, enabling identification of unauthorized access to sensitive user data via the affected component.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct unauthenticated exploitation of a public-facing web application endpoint (/rest/cb/executeBasicSearch) resulting in sensitive information disclosure.
NVD Description
An information disclosure vulnerability in the component /rest/cb/executeBasicSearch of Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR v1.0.118 allows attackers to access sensitive user information.
Deeper analysisAI
CVE-2025-25951 is an information disclosure vulnerability (CWE-200) affecting the /rest/cb/executeBasicSearch component in Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR version 1.0.118. Published on 2025-03-03, it has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with no effect on integrity or availability.
Unauthenticated attackers with network access can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation allows them to access sensitive user information through the affected endpoint.
Vulnerability research details, including potential proof-of-concept information, are available in GitHub repositories such as https://github.com/VvV1per/Vulnerability-Research-CVEs/tree/main/CVE-2025-25951, https://github.com/VvV1per/Vulnerability-Research-CVEs/tree/main/CVE-2024-89638, and https://github.com/el-viper/cve-research/tree/main/CVEs/CVE-2025-25951. No official vendor advisories or patches are referenced in available information.
Details
- CWE(s)