Cyber Posture

CVE-2025-60425

High

Published: 27 October 2025

Published
27 October 2025
Modified
05 November 2025
KEV Added
Patch
CVSS Score 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
EPSS Score 0.0151 81.3th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-60425 is a high-severity Object Hijack (CWE-491) vulnerability in Nagios Fusion. Its CVSS base score is 8.6 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Browser Session Hijacking (T1185); ranked in the top 18.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-12 (Session Termination) and IA-5 (Authenticator Management).

Threat & Defense at a Glance

What attackers do: exploitation maps to Browser Session Hijacking (T1185) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires automatic termination of user sessions upon organization-defined conditions or trigger events, such as enabling 2FA, directly preventing reuse of existing session tokens.

prevent

Mandates proper management and invalidation of authenticators, including session tokens, upon organization-defined events like 2FA enablement.

prevent

Requires re-authentication for privileged actions or changes with session termination options, mitigating persistent token reuse after 2FA activation.

MITRE ATT&CK Enterprise TechniquesAI

T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
T1550.004 Web Session Cookie Lateral Movement
Adversaries can use stolen session cookies to authenticate to web applications and services.
Why these techniques?

The vulnerability fails to invalidate session tokens upon enabling 2FA, enabling browser session hijacking (T1185) and continued use of stolen web session cookies as alternate authentication material (T1550.004) for unauthorized access and privilege escalation.

NVD Description

Nagios Fusion v2024R1.2 and v2024R2 does not invalidate already existing session tokens when the two-factor authentication mechanism is enabled, allowing attackers to perform a session hijacking attack.

Deeper analysisAI

CVE-2025-60425 affects Nagios Fusion versions v2024R1.2 and v2024R2, where the software fails to invalidate existing session tokens upon enabling the two-factor authentication (2FA) mechanism. This flaw, classified under CWE-491 (Masking of a Critical Element), enables session hijacking attacks and carries a CVSS v3.1 base score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L), indicating high severity due to its network accessibility, low attack complexity, and lack of prerequisites like privileges or user interaction.

Unauthenticated attackers can exploit this vulnerability remotely by obtaining a valid session token prior to 2FA enablement—such as through phishing, malware, or prior unauthorized access—and reusing it post-2FA activation to hijack the victim's session. Successful exploitation grants attackers high integrity impact (I:H), allowing unauthorized actions like configuration changes or data manipulation under the victim's privileges, alongside low confidentiality (C:L) and availability (A:L) impacts.

Advisories and mitigation details are available in the provided references, including the Nagios changelog at https://www.nagios.com/changelog/#fusion for patch information and GitHub repositories https://github.com/aakashtyal/Session-Persistence-After-Enabling-2FA and https://github.com/aakashtyal/Session-Persistence-After-Enabling-2FA-CVE-2025-60425 for technical analysis and proof-of-concept. Security practitioners should review these for upgrade guidance and apply patches promptly.

Details

CWE(s)

Affected Products

nagios
fusion
2024

CVEs Like This One

CVE-2024-13996Same product class: network monitoring / SIEM
CVE-2025-44824Same product class: network monitoring / SIEM
CVE-2026-2042Same product class: network monitoring / SIEM
CVE-2023-7317Same product class: network monitoring / SIEM
CVE-2025-34274Same product class: network monitoring / SIEM
CVE-2025-34271Same product class: network monitoring / SIEM
CVE-2025-44823Same product class: network monitoring / SIEM
CVE-2024-14003Same product class: network monitoring / SIEM
CVE-2025-67255Same product class: network monitoring / SIEM
CVE-2025-34277Same product class: network monitoring / SIEM

References