Cyber Posture

CVE-2025-8861

Critical

Published: 29 August 2025

Published
29 August 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0022 44.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-8861 is a critical-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Org (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 44.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-14 directly addresses missing authentication by defining and limiting permitted actions without identification or authentication, preventing unauthorized remote read, modify, and delete database operations.

prevent

IA-8 requires unique identification and authentication for non-organizational users, blocking unauthenticated remote attackers from compromising the database.

prevent

AC-3 enforces approved access control policies including authentication, mitigating the lack of enforcement that allows full database compromise.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
T1565.001 Stored Data Manipulation Impact
Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.
Why these techniques?

Missing authentication on public-facing TSA app directly enables remote exploitation (T1190) for unauthorized database access/collection (T1213.006) and data manipulation (T1565.001).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

TSA developed by Changing has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read, modify, and delete database contents.

Deeper analysisAI

CVE-2025-8861 is a missing authentication vulnerability (CWE-306) in TSA developed by Changing. This flaw allows unauthenticated remote attackers to read, modify, and delete database contents. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), classifying it as critical due to its network accessibility, low attack complexity, and high impacts across confidentiality, integrity, and availability.

Unauthenticated remote attackers can exploit CVE-2025-8861 over the network without requiring privileges or user interaction. Successful exploitation enables complete compromise of the affected database, including unauthorized data exfiltration, alteration, or destruction.

Mitigation details are available in advisories from TWCERT/CC, including https://www.twcert.org.tw/en/cp-139-10361-4ce04-2.html and https://www.twcert.org.tw/tw/cp-132-10360-012e7-1.html. Security practitioners should consult these for patching instructions and workarounds.

Details

CWE(s)

Affected Products

Org
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-1019Shared CWE-306
CVE-2025-10452Shared CWE-306
CVE-2025-61956Shared CWE-306
CVE-2026-1453Shared CWE-306
CVE-2026-31882Shared CWE-306
CVE-2025-27642Shared CWE-306
CVE-2021-47891Shared CWE-306
CVE-2026-26340Shared CWE-306
CVE-2025-3498Shared CWE-306
CVE-2025-52665Shared CWE-306

References