CVE-2025-26201
Published: 24 February 2025
Summary
CVE-2025-26201 is a critical-severity Authentication Bypass by Capture-replay (CWE-294) vulnerability in Greaterwms (inferred from references). Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 33.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires identification, reporting, and timely correction of the specific flaw in GreaterWMS <=2.1.49 that enables credential disclosure via the /staff route.
Enforces approved authorizations to block unauthenticated remote access to the vulnerable /staff route, preventing authentication bypass and privilege escalation.
Limits damage from disclosed staff credentials by restricting privileges to the minimum necessary, mitigating escalation impact.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct remote unauthenticated exploitation of public-facing web app (/staff) for auth bypass and privilege escalation.
NVD Description
Credential disclosure vulnerability via the /staff route in GreaterWMS <= 2.1.49 allows a remote unauthenticated attackers to bypass authentication and escalate privileges.
Deeper analysisAI
CVE-2025-26201 is a credential disclosure vulnerability in the /staff route of GreaterWMS versions 2.1.49 and earlier. Published on 2025-02-24, it enables remote unauthenticated attackers to bypass authentication and escalate privileges. The vulnerability carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) and is classified under CWE-294.
Remote unauthenticated attackers can exploit this vulnerability over the network with low attack complexity and no user interaction required. Exploitation allows bypassing authentication controls, resulting in privilege escalation with high impacts on confidentiality and integrity, though availability remains unaffected.
Mitigation details and further information are available in advisories and resources including the vendor site at http://greaterwms.com, a proof-of-concept at https://github.com/Elymaro/CVE/blob/main/GreaterWMS/CVE-2025-26201.md, and the project issue tracker at https://github.com/GreaterWMS/GreaterWMS/issues/383.
Details
- CWE(s)