CVE-2025-60949
Published: 23 March 2026
Summary
CVE-2025-60949 is a critical-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability in Csprousers Csweb. Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 14.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-22 (Publicly Accessible Content) and CM-6 (Configuration Settings).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SC-14 enforces approved authorizations for logical access to publicly accessible resources, directly preventing unauthenticated attackers from retrieving sensitive secrets in exposed app/config files.
AC-22 controls and monitors publicly accessible content to prevent unintended exposure of configuration files containing leaked secrets.
CM-6 establishes secure configuration settings for web servers and applications to block HTTP access to sensitive directories like app/config.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct exposure of config files on a public-facing web app enables unauthenticated remote exploitation via HTTP requests to retrieve sensitive data.
NVD Description
Census CSWeb 8.0.1 allows "app/config" to be reachable via HTTP in some deployments. A remote, unauthenticated attacker could send requests to configuration files and obtain leaked secrets. Fixed in 8.1.0 alpha.
Deeper analysisAI
CVE-2025-60949 is a high-severity vulnerability (CVSS 9.1, AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) affecting Census CSWeb version 8.0.1, published on 2026-03-23. The issue, tied to CWE-200 (Exposure of Sensitive Information), stems from the "app/config" directory being accessible via HTTP in certain deployments. This exposure allows remote attackers to retrieve configuration files containing sensitive secrets without authentication.
A remote, unauthenticated attacker can exploit this by sending HTTP requests directly to the exposed "app/config" endpoint, obtaining leaked secrets from the configuration files. The vulnerability enables high-impact confidentiality and integrity violations, potentially compromising credentials or other critical data stored in those files, with no privileges or user interaction required.
Mitigation is available in Census CSWeb 8.1.0 alpha, as detailed in the fixing commit at https://github.com/csprousers/csweb/commit/eba0b59a243390a1a4f9524cce6dbc0314bf0d91. Additional resources include a CISA advisory at https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2026/va-26-082-01.json, the official CVE record at https://www.cve.org/CVERecord?id=CVE-2025-60949, and a repository with potential exploit details at https://github.com/hx381/cspro-exploits.
Security practitioners should verify deployments for exposed config paths and upgrade to the patched version, noting the alpha status of the fix.
Details
- CWE(s)