CVE-2025-9254
Published: 22 August 2025
Summary
CVE-2025-9254 is a critical-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Uniong Webitr. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 43.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly identifies and restricts actions permissible without identification or authentication, mitigating the missing authentication in the login functionality exploited by unauthenticated attackers.
Requires unique identification and authentication for organizational users, preventing impersonation of arbitrary users without credentials.
Enforces approved authorizations for logical access, blocking unauthorized login and access to system resources due to the authentication bypass.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Missing authentication (CWE-306) on public-facing web app directly enables remote exploitation (T1190) and abuse of valid accounts via impersonation (T1078).
NVD Description
WebITR developed by Uniong has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to log into the system as arbitrary users by exploiting a specific functionality.
Deeper analysisAI
CVE-2025-9254 is a Missing Authentication vulnerability (CWE-306) in WebITR, a software product developed by Uniong. This flaw enables unauthenticated remote attackers to log into the system as arbitrary users by exploiting a specific functionality. The vulnerability received a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low complexity, and potential for high impact on confidentiality, integrity, and availability. It was published on 2025-08-22.
Unauthenticated attackers with network access can exploit this vulnerability remotely without privileges or user interaction. By targeting the affected functionality, they can impersonate any user account, potentially gaining full administrative access depending on the targeted user's privileges. Successful exploitation could lead to complete system compromise, including data exfiltration, modification of records, or disruption of services.
Advisories from TWCERT/CC detail the issue and are available at https://www.twcert.org.tw/en/cp-139-10329-a1c5d-2.html and https://www.twcert.org.tw/tw/cp-132-10328-dbc35-1.html, providing guidance on identification and mitigation for affected WebITR deployments.
Details
- CWE(s)