CVE-2025-46067
Published: 12 January 2026
Summary
CVE-2025-46067 is a high-severity Use of Hard-coded Password (CWE-259) vulnerability in Automai Director. Its CVSS base score is 8.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the vulnerability by requiring timely installation of patches or updates for Automai Director to remediate the privilege escalation flaw.
Enforces validation of inputs such as crafted JavaScript files to prevent remote exploitation leading to privilege escalation and sensitive information disclosure.
Mandates enforcement of access control policies to block unauthorized privilege escalation even if a crafted JS file is processed.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated network exploitation of public-facing app directly maps to T1190; resulting privilege escalation matches T1068. JS file delivery suggests possible scripting interpreter use but is not explicit enough for inclusion.
NVD Description
An issue in Automai Director v.25.2.0 allows a remote attacker to escalate privileges and obtain sensitive information via a crafted js file
Deeper analysisAI
CVE-2025-46067 is a vulnerability affecting Automai Director version 25.2.0, where an issue allows a remote attacker to escalate privileges and obtain sensitive information via a crafted JavaScript file. Published on 2026-01-12, it carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N) and maps to CWE-259.
The vulnerability can be exploited by a remote attacker requiring no privileges, user interaction, or special access, over the network with low attack complexity. Successful exploitation results in privilege escalation and access to sensitive information, yielding high confidentiality impact and low integrity impact, with no availability impact.
Mitigation details are available in advisories at https://gist.github.com/ZeroBreach-GmbH/98204cff0065e611cf9e9acc3be59e03 and vendor resources at https://www.automai.com/.
Details
- CWE(s)