CVE-2025-60785
Published: 03 November 2025
Summary
CVE-2025-60785 is a high-severity Code Injection (CWE-94) vulnerability in Kagilum Icescrum. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 49.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely identification, reporting, and remediation of flaws like this RCE vulnerability in the Postgres Drivers, directly preventing exploitation.
Mandates validation of all information inputs to the Postgres Drivers component, blocking code injection (CWE-94) from crafted HTML pages.
Deploys malicious code protection mechanisms to prevent and detect arbitrary code execution resulting from the RCE vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a remote code execution in a public-facing web application (iceScrum) exploitable over the network without authentication via a crafted HTML page, directly enabling T1190: Exploit Public-Facing Application.
NVD Description
A remote code execution (RCE) vulnerability in the Postgres Drivers component of iceScrum v7.54 Pro On-prem allows attackers to execute arbitrary code via a crafted HTML page.
Deeper analysisAI
CVE-2025-60785 is a remote code execution (RCE) vulnerability in the Postgres Drivers component of iceScrum v7.54 Pro On-prem. Published on 2025-11-03T16:15:35.470, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H) and maps to CWE-94 (code injection). The issue enables attackers to execute arbitrary code by luring victims into interacting with a crafted HTML page.
Remote attackers can exploit this vulnerability over the network with low attack complexity and no authentication or privileges required, though user interaction is necessary, such as opening the malicious HTML page in a browser. Successful exploitation results in high impacts to confidentiality, integrity, and availability, allowing arbitrary code execution on the targeted iceScrum instance.
For details on mitigation, patches, or workarounds, refer to the advisory at https://zdaylabs.com/CVE-2025-60785.html.
Details
- CWE(s)