CVE-2025-7014
Published: 29 January 2026
Summary
CVE-2025-7014 is a medium-severity Session Fixation (CWE-384) vulnerability in Qrmenumpro Menu Panel. Its CVSS base score is 5.7 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Browser Session Hijacking (T1185); ranked at the 3.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Session termination after a set interval shortens the usable lifetime of a fixed session identifier, making successful exploitation of session fixation more difficult.
Re-authentication typically forces issuance of a new session, limiting the window for exploitation of a previously fixed session identifier.
Enforces proper session ID generation and binding, preventing fixation of a known session token.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Session fixation directly enables web session hijacking and cookie-based authentication abuse in the affected web panel.
NVD Description
Session Fixation vulnerability in QR Menu Pro Smart Menu Systems Menu Panel allows Session Hijacking.This issue affects Menu Panel: through 29012026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Deeper analysisAI
CVE-2025-7014 is a Session Fixation vulnerability in the QR Menu Pro Smart Menu Systems Menu Panel that allows Session Hijacking. The affected component is the Menu Panel, with versions through 29012026 impacted. This issue is classified under CWE-384 and carries a CVSS v3.1 base score of 5.7 (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N), indicating network accessibility, low complexity, low privileges required, user interaction needed, and high confidentiality impact.
Exploitation requires an attacker to have low privileges, such as an authenticated user, and involves tricking the target user into interacting with a maliciously crafted session (UI:R). Over the network (AV:N) with low complexity (AC:L), a successful attack enables session hijacking, granting the attacker high-level access to the victim's confidential session data without impacting integrity or availability.
The Turkish National Cyber Incident Response Center (USOM) published an advisory on this vulnerability at https://www.usom.gov.tr/bildirim/tr-26-0007. The vendor was contacted early regarding disclosure but did not respond, and no patches or specific mitigations are noted in available information.
Details
- CWE(s)