Cyber Posture

CVE-2025-53118

Critical

Published: 25 August 2025

Published
25 August 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.3458 97.0th percentile
Risk Priority 40 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-53118 is a critical-severity Missing Authentication for Critical Function (CWE-306) vulnerability. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 3.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and IA-2 (Identification and Authentication (Organizational Users)).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CVE-2025-53118 by requiring timely identification, reporting, and correction of the authentication bypass flaw through patching.

prevent

Requires robust identification and authentication for organizational users, preventing unauthenticated access to administrator backup functions in the PAM system.

prevent

Enforces approved authorizations for access to sensitive backup controls, countering the authentication bypass vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1552 Unsecured Credentials Credential Access
Adversaries may search compromised systems to find and obtain insecurely stored credentials.
Why these techniques?

Auth bypass in network-exposed PAM directly enables T1190 exploitation for credential access via T1552 from backups/tokens.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An authentication bypass vulnerability exists which allows an unauthenticated attacker to control administrator backup functions, leading to compromise of passwords, secrets, and application session tokens stored by the Unified PAM.

Deeper analysisAI

CVE-2025-53118 is an authentication bypass vulnerability (CWE-306) in Securden Unified PAM, a privileged access management solution. It enables an unauthenticated attacker to gain control over administrator backup functions, resulting in the compromise of stored passwords, secrets, and application session tokens. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low complexity, and lack of prerequisites.

An unauthenticated remote attacker can exploit this flaw over the network with minimal effort, bypassing authentication to manipulate administrator backups. Successful exploitation grants high-level access to sensitive credentials and tokens, potentially enabling full compromise of the PAM system, lateral movement within the environment, and persistence through stolen secrets.

Rapid7's advisory details the fix for this and other critical vulnerabilities in Securden Unified PAM, recommending immediate application of patches provided by the vendor to mitigate the authentication bypass and prevent unauthorized backup control.

Details

CWE(s)

CVEs Like This One

CVE-2026-3323Shared CWE-306
CVE-2026-30846Shared CWE-306
CVE-2026-1453Shared CWE-306
CVE-2026-31882Shared CWE-306
CVE-2025-27642Shared CWE-306
CVE-2021-47891Shared CWE-306
CVE-2026-26340Shared CWE-306
CVE-2025-3498Shared CWE-306
CVE-2025-52665Shared CWE-306
CVE-2025-0355Shared CWE-306

References