CVE-2025-7016
Published: 29 January 2026
Summary
CVE-2025-7016 is a high-severity Improper Access Control (CWE-284) vulnerability in Akinsoft Qr Menu. Its CVSS base score is 8.0 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 24.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly enforces approved access authorizations, preventing improper access control that enables authentication abuse by low-privilege users.
Applies least privilege to restrict low-privilege (PR:L) accounts from accessing sensitive functions, mitigating the high-impact exploitation.
Mandates timely flaw remediation through patching to QR Menu s1.05.12 or later, eliminating the specific improper access control vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Improper access control in public-facing QR Menu web app directly enables remote exploitation for auth bypass and unauthorized access (T1190).
NVD Description
Improper Access Control vulnerability in Akın Software Computer Import Export Industry and Trade Ltd. QR Menu allows Authentication Abuse.This issue affects QR Menu: before s1.05.12.
Deeper analysisAI
CVE-2025-7016 is an Improper Access Control vulnerability in the QR Menu software developed by Akın Software Computer Import Export Industry and Trade Ltd. The flaw enables Authentication Abuse and affects all versions of QR Menu prior to s1.05.12. It has been assigned a CVSS v3.1 base score of 8.0 (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H) and is associated with CWE-284 (Improper Access Control) as well as NVD-CWE-Other.
An attacker with low privileges can exploit this vulnerability over the network with low complexity, though it requires user interaction. Successful exploitation grants high impacts on confidentiality, integrity, and availability, potentially allowing the attacker to abuse authentication mechanisms and gain unauthorized access to sensitive functions or data within the QR Menu application.
The advisory at https://www.usom.gov.tr/bildirim/tr-26-0006 provides details on the vulnerability. Mitigation involves updating to QR Menu version s1.05.12 or later, as the issue is fixed in that release.
Details
- CWE(s)