Cyber Posture

CVE-2025-62586

Critical

Published: 16 October 2025

Published
16 October 2025
Modified
29 October 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0011 28.6th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-62586 is a critical-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Opexustech Foiaxpress. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 28.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Mandates timely remediation of known flaws like CVE-2025-62586 by applying the vendor patch in FOIAXpress version 11.13.2.0.

prevent

Explicitly limits permitted actions without identification or authentication, preventing unauthenticated admin password resets.

preventdetect

Enables management, review, and notification of account changes to mitigate and identify unauthorized administrator password modifications.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Unauthenticated remote password reset in public-facing FOIAXpress software directly enables T1190 (Exploit Public-Facing Application) for initial access and T1068 (Exploitation for Privilege Escalation) to gain full admin control.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

OPEXUS FOIAXpress allows a remote, unauthenticated attacker to reset the administrator password. Fixed in FOIAXpress version 11.13.2.0.

Deeper analysisAI

CVE-2025-62586 is a critical vulnerability in OPEXUS FOIAXpress software that enables a remote, unauthenticated attacker to reset the administrator password. The issue, classified under CWE-306 (Missing Authentication for Critical Function), affects FOIAXpress versions prior to 11.13.2.0 and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for complete system compromise.

A remote attacker with network access to the FOIAXpress instance can exploit this vulnerability without authentication, privileges, or user interaction. Successful exploitation allows the attacker to reset the administrator password, granting full administrative control over the application. This could enable unauthorized access to sensitive data, modification of configurations, or further lateral movement within the environment hosting FOIAXpress.

Mitigation is addressed in the official FOIAXpress release notes for version 11.13.2.0, which explicitly fixes this vulnerability. Security practitioners should upgrade to FOIAXpress 11.13.2.0 or later. Additional details are available in the CISA Known Exploited Vulnerabilities Catalog advisory (va-25-289-01) and the official CVE record.

Details

CWE(s)

Affected Products

opexustech
foiaxpress
11.1.0 — 11.13.2.0

CVEs Like This One

CVE-2026-22230Same vendor: Opexustech
CVE-2026-25192Shared CWE-306
CVE-2026-26055Shared CWE-306
CVE-2026-25848Shared CWE-306
CVE-2026-22234Same vendor: Opexustech
CVE-2026-27028Shared CWE-306
CVE-2026-27767Shared CWE-306
CVE-2026-27772Shared CWE-306
CVE-2026-29796Shared CWE-306
CVE-2026-26125Shared CWE-306

References