CVE-2025-67805
Published: 01 April 2026
Summary
CVE-2025-67805 is a medium-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Sagedpw Sage Dpw. Its CVSS base score is 5.9 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 13.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and CM-6 (Configuration Settings).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
AC-14 requires limiting and documenting actions permitted without identification or authentication, directly preventing unauthenticated access to sensitive diagnostic endpoints.
CM-7 mandates configuring systems to provide only essential capabilities and prohibiting non-essential functions like the Database Monitor feature that expose sensitive data.
CM-6 establishes and enforces secure configuration settings that disable or protect the Database Monitor feature by default, addressing the non-default configuration vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Missing authentication on public-facing diagnostic endpoints directly enables remote exploitation of the application (T1190) and exposes credential hashes (T1552).
NVD Description
A non-default configuration in Sage DPW 2025_06_004 allows unauthenticated access to diagnostic endpoints within the Database Monitor feature, exposing sensitive information such as hashes and table names. This feature is disabled by default in all installations and never available in…
more
Sage DPW Cloud. It was forcibly disabled again in version 2025_06_003.
Deeper analysisAI
CVE-2025-67805 is a vulnerability in Sage DPW version 2025_06_004 stemming from a non-default configuration that enables unauthenticated access to diagnostic endpoints in the Database Monitor feature. This flaw exposes sensitive information, including hashes and table names. The Database Monitor feature is disabled by default across all installations and is never available in Sage DPW Cloud.
Remote unauthenticated attackers can exploit this vulnerability over the network, provided the high attack complexity requirements are met and no user interaction or privileges are needed. Successful exploitation results in high confidentiality impact through disclosure of sensitive data, with no integrity or availability disruption, as reflected in the CVSS v3.1 base score of 5.9 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) and associated CWE-306 (Missing Authentication for Critical Function).
Advisories note that the feature was forcibly disabled in Sage DPW version 2025_06_003. Additional details are available in references such as https://pastebin.com/Tk4LgMG2 and https://www.sagedpw.at/.
Details
- CWE(s)