Cyber Posture

CVE-2025-25975

HighPublic PoC

Published: 12 March 2025

Published
12 March 2025
Modified
02 April 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0003 10.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-25975 is a high-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability in Jonschlinkert Parse-Git-Config. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 10.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 CM-10 (Software Usage Restrictions) and RA-5 (Vulnerability Monitoring and Scanning).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely identification, reporting, and correction of flaws like CVE-2025-25975 in parse-git-config v3.0.0.

detect

Enables vulnerability scanning to identify deployments of the vulnerable parse-git-config v3.0.0 library.

prevent

Prohibits installation and use of unapproved or vulnerable software such as parse-git-config v3.0.0.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The CVE describes a remote, unauthenticated network vulnerability in a library that can be exploited in public-facing applications to disclose sensitive information, directly mapping to T1190 Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

An issue in parse-git-config v.3.0.0 allows an attacker to obtain sensitive information via the expandKeys function

Deeper analysisAI

CVE-2025-25975 is a vulnerability in parse-git-config version 3.0.0 that allows an attacker to obtain sensitive information through the expandKeys function. This issue falls under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) and has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high severity due to significant confidentiality impact.

A remote, unauthenticated attacker can exploit this vulnerability over the network with low attack complexity and no user interaction required. Successful exploitation enables the attacker to disclose sensitive information handled by the affected component.

The vulnerability is tracked and discussed in GitHub issue #14 for the parse-git-config repository at https://github.com/jonschlinkert/parse-git-config/issues/14. No specific mitigation or patch details are provided in the referenced advisories.

Details

CWE(s)

Affected Products

jonschlinkert
parse-git-config
3.0.0

CVEs Like This One

CVE-2026-24870Shared CWE-200
CVE-2024-57716Shared CWE-200
CVE-2026-23743Shared CWE-200
CVE-2025-67274Shared CWE-200
CVE-2026-34305Shared CWE-200
CVE-2026-21532Shared CWE-200
CVE-2025-22918Shared CWE-200
CVE-2026-2262Shared CWE-200
CVE-2026-40584Shared CWE-200
CVE-2026-32098Shared CWE-200

References