Cyber Posture

CVE-2025-60949

Critical

Published: 23 March 2026

Published
23 March 2026
Modified
25 March 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0005 14.3th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-60949 is a critical-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability in Csprousers Csweb. Its CVSS base score is 9.1 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 14.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-22 (Publicly Accessible Content) and CM-6 (Configuration Settings).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SC-14 enforces approved authorizations for logical access to publicly accessible resources, directly preventing unauthenticated attackers from retrieving sensitive secrets in exposed app/config files.

prevent

AC-22 controls and monitors publicly accessible content to prevent unintended exposure of configuration files containing leaked secrets.

prevent

CM-6 establishes secure configuration settings for web servers and applications to block HTTP access to sensitive directories like app/config.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Direct exposure of config files on a public-facing web app enables unauthenticated remote exploitation via HTTP requests to retrieve sensitive data.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Census CSWeb 8.0.1 allows "app/config" to be reachable via HTTP in some deployments. A remote, unauthenticated attacker could send requests to configuration files and obtain leaked secrets. Fixed in 8.1.0 alpha.

Deeper analysisAI

CVE-2025-60949 is a high-severity vulnerability (CVSS 9.1, AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) affecting Census CSWeb version 8.0.1, published on 2026-03-23. The issue, tied to CWE-200 (Exposure of Sensitive Information), stems from the "app/config" directory being accessible via HTTP in certain deployments. This exposure allows remote attackers to retrieve configuration files containing sensitive secrets without authentication.

A remote, unauthenticated attacker can exploit this by sending HTTP requests directly to the exposed "app/config" endpoint, obtaining leaked secrets from the configuration files. The vulnerability enables high-impact confidentiality and integrity violations, potentially compromising credentials or other critical data stored in those files, with no privileges or user interaction required.

Mitigation is available in Census CSWeb 8.1.0 alpha, as detailed in the fixing commit at https://github.com/csprousers/csweb/commit/eba0b59a243390a1a4f9524cce6dbc0314bf0d91. Additional resources include a CISA advisory at https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2026/va-26-082-01.json, the official CVE record at https://www.cve.org/CVERecord?id=CVE-2025-60949, and a repository with potential exploit details at https://github.com/hx381/cspro-exploits.

Security practitioners should verify deployments for exposed config paths and upgrade to the patched version, noting the alpha status of the fix.

Details

CWE(s)

Affected Products

csprousers
csweb
8.0.1

CVEs Like This One

CVE-2025-60947Same product: Csprousers Csweb
CVE-2025-60946Same product: Csprousers Csweb
CVE-2026-24870Shared CWE-200
CVE-2024-57716Shared CWE-200
CVE-2026-23743Shared CWE-200
CVE-2025-67274Shared CWE-200
CVE-2026-34305Shared CWE-200
CVE-2026-21532Shared CWE-200
CVE-2025-25975Shared CWE-200
CVE-2025-22918Shared CWE-200

References