CVE-2025-70983
Published: 23 January 2026
Summary
CVE-2025-70983 is a critical-severity Improper Access Control (CWE-284) vulnerability in Bladex Springblade. Its CVSS base score is 9.9 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 5.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-24 (Access Control Decisions) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for access to system resources, directly addressing the incorrect access control in SpringBlade's authRoutes function that enables privilege escalation.
Implements least privilege to restrict low-level privileged attackers from escalating privileges via the authRoutes vulnerability.
Provides capability for explicit access control decisions on system resources, mitigating missing authorization in authRoutes that allows low-privilege escalation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct privilege escalation from low-privileged access via missing authorization in authRoutes (CWE-284/862).
NVD Description
Incorrect access control in the authRoutes function of SpringBlade v4.5.0 allows attackers with low-level privileges to escalate privileges.
Deeper analysisAI
CVE-2025-70983 is an incorrect access control vulnerability affecting the authRoutes function in SpringBlade version 4.5.0. Published on 2026-01-23, this issue enables attackers with low-level privileges to escalate their privileges. It carries a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) and maps to CWE-284 (Improper Access Control) and CWE-862 (Missing Authorization).
Attackers with low-level privileges (PR:L) can exploit this vulnerability remotely over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Successful exploitation changes scope (S:C) and grants high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), allowing privilege escalation within the affected SpringBlade instance.
Mitigation details are available in referenced sources, including the SpringBlade GitHub repository at https://github.com/chillzhuang/SpringBlade, the related issue tracker at https://github.com/chillzhuang/SpringBlade/issues/35, and a gist at https://gist.github.com/old6ma/9c4d2ba32cd8f562cb80796538157912. Security practitioners should review these for patches or workarounds specific to SpringBlade v4.5.0.
Details
- CWE(s)