Cyber Posture

CVE-2025-9004

LowPublic PoC

Published: 15 August 2025

Published
15 August 2025
Modified
29 April 2026
KEV Added
Patch
CVSS Score 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
EPSS Score 0.0014 34.4th percentile
Risk Priority 7 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-9004 is a low-severity Improper Restriction of Excessive Authentication Attempts (CWE-307) vulnerability in Mtons Mblog. Its CVSS base score is 3.7 (Low).

Operationally, exploitation aligns with the MITRE ATT&CK technique Password Guessing (T1110.001); ranked at the 34.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Password Guessing (T1110.001).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-307

This control directly enforces limits on consecutive invalid logon attempts and automatic response (e.g., lockout) to prevent brute-force exploitation of authentication mechanisms.

addresses: CWE-307

Specific conditions can include excessive failed attempts, triggering stronger authentication that restricts brute-force exploitation.

addresses: CWE-799

The control requires defining frequency, timing, and approval for security interactions, directly addressing uncontrolled interaction rates.

addresses: CWE-799

Allocation policies inherently restrict interaction frequency, reducing the impact of excessive requests.

addresses: CWE-799

Spam protection explicitly controls interaction frequency by detecting and acting on bulk unsolicited messages from external sources.

MITRE ATT&CK Enterprise TechniquesAI

T1110.001 Password Guessing Credential Access
Adversaries with no prior knowledge of legitimate credentials within the system or environment may guess passwords to attempt access to accounts.
Why these techniques?

The vulnerability in the /settings/password endpoint lacks rate limiting or CAPTCHA, enabling brute force password guessing (T1110.001) remotely without authentication, as explicitly mapped by VulDB.

NVD Description

A vulnerability was found in mtons mblog up to 3.5.0. This issue affects some unknown processing of the file /settings/password. The manipulation leads to improper restriction of excessive authentication attempts. The attack may be initiated remotely. The complexity of an…

more

attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.

Deeper analysisAI

CVE-2025-9004 is a vulnerability in mtons mblog versions up to 3.5.0, affecting unknown processing of the /settings/password file. It manifests as improper restriction of excessive authentication attempts, mapped to CWE-307 and CWE-799. The CVSS v3.1 base score is 3.7 (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N), indicating low severity with network accessibility but high attack complexity.

Remote, unauthenticated attackers can exploit this issue with no user interaction required. Exploitation enables limited confidentiality impact, such as potential information disclosure through excessive authentication attempts on the affected endpoint, though it is considered difficult overall.

Advisories referenced in Gitee issues (https://gitee.com/mtons/mblog/issues/ICPMIR) and VulDB entries (https://vuldb.com/?ctiid.320033, https://vuldb.com/?id.320033, https://vuldb.com/?submit.628785) provide further details. The exploit has been publicly disclosed and may be used.

Notable context includes the vulnerability's publication on 2025-08-15 and recognition that exploitation is rather high in complexity and known to be difficult.

Details

CWE(s)

Affected Products

mtons
mblog
≤ 3.5.0

CVEs Like This One

CVE-2025-58587Shared CWE-307
CVE-2026-24436Shared CWE-307
CVE-2025-36363Shared CWE-307
CVE-2026-27521Shared CWE-307
CVE-2026-32292Shared CWE-307
CVE-2024-9342Shared CWE-307
CVE-2026-30790Shared CWE-307
CVE-2025-12547Shared CWE-307, CWE-799
CVE-2026-27778Shared CWE-307
CVE-2026-2110Shared CWE-307, CWE-799

References