CVE-2025-65854
Published: 12 December 2025
Summary
CVE-2025-65854 is a critical-severity Code Injection (CWE-94) vulnerability in Mineadmin Mineadmin. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 23.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for access to the scheduled tasks feature, directly preventing unauthenticated attackers from executing arbitrary commands due to insecure permissions.
Applies least privilege to scheduled tasks processes and features, restricting unauthorized command execution and mitigating full account takeover.
Validates inputs to the scheduled tasks feature against code injection (CWE-94), blocking arbitrary command execution by unauthenticated remote attackers.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote code injection in public-facing web application (MineAdmin) scheduled tasks enables exploitation of public-facing application (T1190) and arbitrary command execution (T1059).
NVD Description
Insecure permissions in the scheduled tasks feature of MineAdmin v3.x allows attackers to execute arbitrary commands and execute a full account takeover.
Deeper analysisAI
CVE-2025-65854 is a critical vulnerability (CVSS 9.8, CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) affecting MineAdmin v3.x, caused by insecure permissions in its scheduled tasks feature. Classified under CWE-94 (code injection), the flaw enables attackers to execute arbitrary commands and perform a full account takeover. The issue was published on 2025-12-12T16:15:44.843.
Unauthenticated remote attackers can exploit this vulnerability over the network with low attack complexity and no user interaction required. Exploitation allows arbitrary command execution on the server, leading to complete account takeover, with high impacts on confidentiality, integrity, and availability.
Advisories and additional details, including potential patches or mitigations, are referenced at http://mineadmin.com, https://gist.github.com/SourByte05/1a6c6b08ac47c5d58eb7dd4422cc23b7, and https://www.mineadmin.com/.
Details
- CWE(s)