Cyber Posture

CVE-2025-60803

CriticalRCE

Published: 24 October 2025

Published
24 October 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0029 52.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-60803 is a critical-severity OS Command Injection (CWE-78) vulnerability. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 47.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates OS command injection (CWE-78) in the /api/aaa;/../register endpoint by requiring validation of all information inputs to prevent malicious command execution.

prevent

Requires identification, reporting, and correction of the specific flaw in Antabot White-Jotter up to commit 9bcadc, preventing exploitation of this RCE vulnerability.

prevent

Limits the scope of unauthenticated actions on publicly accessible endpoints like /api/aaa;/../register, preventing RCE by restricting permitted functions without identification or authentication.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Unauthenticated remote code execution vulnerability in a public-facing web application API endpoint via OS command injection directly enables exploitation of public-facing applications (T1190).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Antabot White-Jotter up to commit 9bcadc was discovered to contain an unauthenticated remote code execution (RCE) vulnerability via the component /api/aaa;/../register.

Deeper analysisAI

CVE-2025-60803 is an unauthenticated remote code execution (RCE) vulnerability in Antabot White-Jotter up to commit 9bcadc. The issue stems from the component /api/aaa;/../register and is classified under CWE-78 (OS Command Injection). It received a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility and lack of prerequisites.

Any unauthenticated attacker with network access to the vulnerable instance can exploit this flaw without user interaction. Successful exploitation enables arbitrary code execution on the server, potentially compromising confidentiality, integrity, and availability with high impact.

Mitigation details and further information are available in the GitHub issue at https://github.com/Antabot/White-Jotter/issues/162.

Details

CWE(s)

CVEs Like This One

CVE-2025-60738Shared CWE-78
CVE-2026-0781Shared CWE-78
CVE-2024-50603Shared CWE-78
CVE-2026-41247Shared CWE-78
CVE-2026-32968Shared CWE-78
CVE-2026-4631Shared CWE-78
CVE-2025-64111Shared CWE-78
CVE-2025-56819Shared CWE-78
CVE-2024-49601Shared CWE-78
CVE-2025-64755Shared CWE-78

References