Cyber Posture

CVE-2025-67805

Medium

Published: 01 April 2026

Published
01 April 2026
Modified
10 May 2026
KEV Added
Patch
CVSS Score 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0004 13.9th percentile
Risk Priority 12 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-67805 is a medium-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Sagedpw Sage Dpw. Its CVSS base score is 5.9 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 13.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and CM-6 (Configuration Settings).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-14 requires limiting and documenting actions permitted without identification or authentication, directly preventing unauthenticated access to sensitive diagnostic endpoints.

prevent

CM-7 mandates configuring systems to provide only essential capabilities and prohibiting non-essential functions like the Database Monitor feature that expose sensitive data.

prevent

CM-6 establishes and enforces secure configuration settings that disable or protect the Database Monitor feature by default, addressing the non-default configuration vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1552 Unsecured Credentials Credential Access
Adversaries may search compromised systems to find and obtain insecurely stored credentials.
Why these techniques?

Missing authentication on public-facing diagnostic endpoints directly enables remote exploitation of the application (T1190) and exposes credential hashes (T1552).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A non-default configuration in Sage DPW 2025_06_004 allows unauthenticated access to diagnostic endpoints within the Database Monitor feature, exposing sensitive information such as hashes and table names. This feature is disabled by default in all installations and never available in…

more

Sage DPW Cloud. It was forcibly disabled again in version 2025_06_003.

Deeper analysisAI

CVE-2025-67805 is a vulnerability in Sage DPW version 2025_06_004 stemming from a non-default configuration that enables unauthenticated access to diagnostic endpoints in the Database Monitor feature. This flaw exposes sensitive information, including hashes and table names. The Database Monitor feature is disabled by default across all installations and is never available in Sage DPW Cloud.

Remote unauthenticated attackers can exploit this vulnerability over the network, provided the high attack complexity requirements are met and no user interaction or privileges are needed. Successful exploitation results in high confidentiality impact through disclosure of sensitive data, with no integrity or availability disruption, as reflected in the CVSS v3.1 base score of 5.9 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) and associated CWE-306 (Missing Authentication for Critical Function).

Advisories note that the feature was forcibly disabled in Sage DPW version 2025_06_003. Additional details are available in references such as https://pastebin.com/Tk4LgMG2 and https://www.sagedpw.at/.

Details

CWE(s)

Affected Products

sagedpw
sage dpw
2025_06_004

CVEs Like This One

CVE-2024-56883Same product: Sagedpw Sage Dpw
CVE-2026-30846Shared CWE-200, CWE-306
CVE-2026-34472Shared CWE-200, CWE-306
CVE-2026-25146Shared CWE-200
CVE-2025-68438Shared CWE-200
CVE-2025-53118Shared CWE-306
CVE-2024-56902Shared CWE-200
CVE-2024-48125Shared CWE-200
CVE-2025-55190Shared CWE-200
CVE-2026-3323Shared CWE-306

References