CVE-2025-25975
Published: 12 March 2025
Summary
CVE-2025-25975 is a high-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability in Jonschlinkert Parse-Git-Config. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 10.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 CM-10 (Software Usage Restrictions) and RA-5 (Vulnerability Monitoring and Scanning).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates timely identification, reporting, and correction of flaws like CVE-2025-25975 in parse-git-config v3.0.0.
Enables vulnerability scanning to identify deployments of the vulnerable parse-git-config v3.0.0 library.
Prohibits installation and use of unapproved or vulnerable software such as parse-git-config v3.0.0.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes a remote, unauthenticated network vulnerability in a library that can be exploited in public-facing applications to disclose sensitive information, directly mapping to T1190 Exploit Public-Facing Application.
NVD Description
An issue in parse-git-config v.3.0.0 allows an attacker to obtain sensitive information via the expandKeys function
Deeper analysisAI
CVE-2025-25975 is a vulnerability in parse-git-config version 3.0.0 that allows an attacker to obtain sensitive information through the expandKeys function. This issue falls under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) and has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high severity due to significant confidentiality impact.
A remote, unauthenticated attacker can exploit this vulnerability over the network with low attack complexity and no user interaction required. Successful exploitation enables the attacker to disclose sensitive information handled by the affected component.
The vulnerability is tracked and discussed in GitHub issue #14 for the parse-git-config repository at https://github.com/jonschlinkert/parse-git-config/issues/14. No specific mitigation or patch details are provided in the referenced advisories.
Details
- CWE(s)