CVE-2025-7015
Published: 29 January 2026
Summary
CVE-2025-7015 is a medium-severity Session Fixation (CWE-384) vulnerability in Akinsoft Qr Menu. Its CVSS base score is 5.7 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 13.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Session termination after a set interval shortens the usable lifetime of a fixed session identifier, making successful exploitation of session fixation more difficult.
Re-authentication typically forces issuance of a new session, limiting the window for exploitation of a previously fixed session identifier.
Enforces proper session ID generation and binding, preventing fixation of a known session token.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Session fixation in public-facing web app directly enables exploitation for initial access (T1190) and use of fixed session token as alternate auth material (T1550.004).
NVD Description
Session Fixation vulnerability in Akın Software Computer Import Export Industry and Trade Ltd. QR Menu allows Session Fixation.This issue affects QR Menu: before s1.05.12.
Deeper analysisAI
CVE-2025-7015 is a Session Fixation vulnerability (CWE-384) in the QR Menu software developed by Akın Software Computer Import Export Industry and Trade Ltd. The issue affects QR Menu versions prior to s1.05.12. It has a CVSS v3.1 base score of 5.7 (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N), indicating medium severity with network accessibility, low attack complexity, requirements for low-privilege authentication and user interaction, unchanged scope, and high impact on confidentiality.
An authenticated attacker with low privileges can exploit this vulnerability over the network by fixing a session identifier and tricking a user into authenticating with that fixed session. Upon successful user interaction, the attacker gains access to the victim's session, potentially exposing sensitive confidential information without impacting integrity or availability.
The Turkish National Cyber Incident Response Center (USOM) has issued an advisory on this vulnerability, available at https://www.usom.gov.tr/bildirim/tr-26-0006. Mitigation involves upgrading to QR Menu version s1.05.12 or later, where the issue is addressed.
Details
- CWE(s)