EUVD-2025-18173

| CVE-2025-49181 HIGH
2025-06-12 [email protected]
8.6
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 21:20 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 21:20 euvd
EUVD-2025-18173
CVE Published
Jun 12, 2025 - 14:15 nvd
HIGH 8.6

Description

Due to missing authorization of an API endpoint, unauthorized users can send HTTP GET requests to gather sensitive information. An attacker could also send HTTP POST requests to modify the log files’ root path as well as the TCP ports the service is running on, leading to a Denial of Service attack.

Analysis

CVE-2025-49181 is an authorization bypass vulnerability in an unspecified API endpoint that allows unauthenticated remote attackers to read sensitive information via HTTP GET requests and modify service configuration (log paths, TCP ports) via HTTP POST requests, potentially causing denial of service. With a CVSS score of 8.6 and network-accessible attack vector requiring no authentication, this vulnerability presents a significant risk to exposed instances; KEV/EPSS/POC status cannot be confirmed from provided data, warranting immediate investigation of affected infrastructure.

Technical Context

This vulnerability stems from CWE-862 (Missing Authorization), a common flaw where API endpoints lack proper authentication and authorization controls. The affected service exposes HTTP REST/API endpoints that process both read operations (GET requests returning sensitive data such as configuration, logs, or system information) and write operations (POST requests modifying runtime configuration including log file paths and listening TCP ports). The root cause is the absence of authorization checks before processing these requests, allowing any network-accessible client to interact with the API regardless of authentication status. This is particularly dangerous in microservices architectures and cloud deployments where services may be inadvertently exposed or accessible from untrusted networks. Without specific CPE data provided in the vulnerability description, the affected product cannot be precisely identified, though the nature of the vulnerability (API endpoint, logging configuration, port binding) suggests this may affect application servers, monitoring tools, or infrastructure management services.

Affected Products

No specific product name, vendor, or version information is provided in the CVE description or accompanying data. The vulnerability affects 'an API endpoint' of an unspecified service with capabilities including log file management and TCP port configuration. Organizations should: (1) Query the NVD/MITRE CVE database directly using CVE-2025-49181 to identify affected CPE strings; (2) Check internal vulnerability scanning results filtering for this CVE; (3) Consult vendor security advisories if a product has been identified; (4) Contact software vendors if their services expose HTTP API endpoints with configuration modification capabilities. Without vendor/product attribution, a targeted advisory cannot be issued. If available, vendor security bulletins should list specific versions (e.g., 'Product X versions 5.0-5.4.2' or 'all versions before 6.0 patch 1').

Remediation

Immediate steps: (1) PATCH: Apply vendor security updates when available; consult vendor advisories for specific version numbers and update procedures; (2) RESTRICT ACCESS: Implement network-level access controls (firewalls, WAF, NACLs) to limit API endpoint exposure to trusted networks/IP ranges only; (3) AUTHENTICATION: If a patch is unavailable, enforce API authentication via API keys, OAuth2, or mutual TLS at the reverse proxy/load balancer layer; (4) AUTHORIZATION: Implement role-based access control (RBAC) on all API operations, validating user permissions before processing GET/POST requests; (5) AUDIT: Enable detailed API request logging to detect exploitation attempts; (6) MONITOR: Set alerts on configuration changes (port modifications, log path changes) to detect active exploitation. Workaround: Place the service behind an authenticated API gateway or reverse proxy that enforces authentication on all requests before forwarding to the vulnerable service.

Priority Score

43
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +43
POC: 0

Share

EUVD-2025-18173 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy