CVE-2025-62586
Published: 16 October 2025
Summary
CVE-2025-62586 is a critical-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Opexustech Foiaxpress. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 28.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Mandates timely remediation of known flaws like CVE-2025-62586 by applying the vendor patch in FOIAXpress version 11.13.2.0.
Explicitly limits permitted actions without identification or authentication, preventing unauthenticated admin password resets.
Enables management, review, and notification of account changes to mitigate and identify unauthorized administrator password modifications.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote password reset in public-facing FOIAXpress software directly enables T1190 (Exploit Public-Facing Application) for initial access and T1068 (Exploitation for Privilege Escalation) to gain full admin control.
NVD Description
OPEXUS FOIAXpress allows a remote, unauthenticated attacker to reset the administrator password. Fixed in FOIAXpress version 11.13.2.0.
Deeper analysisAI
CVE-2025-62586 is a critical vulnerability in OPEXUS FOIAXpress software that enables a remote, unauthenticated attacker to reset the administrator password. The issue, classified under CWE-306 (Missing Authentication for Critical Function), affects FOIAXpress versions prior to 11.13.2.0 and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for complete system compromise.
A remote attacker with network access to the FOIAXpress instance can exploit this vulnerability without authentication, privileges, or user interaction. Successful exploitation allows the attacker to reset the administrator password, granting full administrative control over the application. This could enable unauthorized access to sensitive data, modification of configurations, or further lateral movement within the environment hosting FOIAXpress.
Mitigation is addressed in the official FOIAXpress release notes for version 11.13.2.0, which explicitly fixes this vulnerability. Security practitioners should upgrade to FOIAXpress 11.13.2.0 or later. Additional details are available in the CISA Known Exploited Vulnerabilities Catalog advisory (va-25-289-01) and the official CVE record.
Details
- CWE(s)