Cyber Posture

CVE-2025-53928

MediumPublic PoC

Published: 17 July 2025

Published
17 July 2025
Modified
02 August 2025
KEV Added
Patch
CVSS Score 4.6 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
EPSS Score 0.0078 73.8th percentile
Risk Priority 10 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-53928 is a medium-severity Code Injection (CWE-94) vulnerability in Maxkb Maxkb. Its CVSS base score is 4.6 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 26.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

This vulnerability is AI-related — categorised as Other Platforms; in the Protocol-Specific Risks risk domain.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-94

Makes persistent code injection into loaded programs impossible when the executable image itself resides on hardware-protected read-only media.

addresses: CWE-94

Dynamically generated code can be produced and executed inside the isolated chamber, preventing host compromise from code-injection payloads.

addresses: CWE-94

Validates inputs used in dynamic code generation to block injected directives.

addresses: CWE-94

Directly prevents execution of attacker-supplied code written into data memory regions.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Remote Command Execution vulnerability in MCP call enables exploitation of a public-facing application (T1190) to execute arbitrary commands using command and scripting interpreters (T1059).

NVD Description

MaxKB is an open-source AI assistant for enterprise. Prior to versions 1.10.9-lts and 2.0.0, a Remote Command Execution vulnerability exists in the MCP call. Versions 1.10.9-lts and 2.0.0 fix the issue.

Deeper analysisAI

CVE-2025-53928 is a remote command execution vulnerability (CWE-94) in MaxKB, an open-source AI assistant for enterprise. The flaw exists in the MCP call and affects versions prior to 1.10.9-lts and 2.0.0. Published on 2025-07-17, it carries a CVSS v3.1 base score of 4.6 (AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L), indicating moderate severity with network accessibility but high complexity.

Exploitation requires an attacker to have low privileges (PR:L), perform a high-complexity attack (AC:H) over the network (AV:N), and rely on user interaction (UI:R). A successful attack could result in low-impact confidentiality, integrity, and availability violations (C:L/I:L/A:L) within the unchanged scope (S:U), such as limited command execution on the affected system.

Mitigation is available via upgrades to MaxKB versions 1.10.9-lts or 2.0.0, which address the issue. Additional details are provided in the GitHub security advisory (GHSA-38q2-4mm7-qf5h) at https://github.com/1Panel-dev/MaxKB/security/advisories/GHSA-38q2-4mm7-qf5h and release notes for v2.0.0 at https://github.com/1Panel-dev/MaxKB/releases/tag/v2.0.0.

Details

CWE(s)

Affected Products

maxkb
maxkb
≤ 1.10.9

AI Security AnalysisAI

AI Category
Other Platforms
Risk Domain
Protocol-Specific Risks
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
MaxKB is explicitly described as an open-source AI assistant for enterprise, matching the Enterprise AI Assistants category.

CVEs Like This One

CVE-2026-39421Same product: Maxkb Maxkb
CVE-2026-39418Same product: Maxkb Maxkb
CVE-2024-56137Same product: Maxkb Maxkb
CVE-2026-39420Same product: Maxkb Maxkb
CVE-2025-22906Shared CWE-94
CVE-2025-71281Shared CWE-94
CVE-2024-9132Shared CWE-94
CVE-2024-50658Shared CWE-94
CVE-2026-25807Shared CWE-94
CVE-2026-32525Shared CWE-94

References