CWE-348
Use of Less Trusted Source
The product has two different sources of the same data or information, but it uses the source that has less support for verification, is less trusted, or is less resistant to attack.
CVE-2025-53522 (GCVE-0-2025-53522)
Vulnerability from cvelistv5
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
- CWE-348 - Use of less trusted source
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-53522", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-20T16:00:10.875489Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-20T16:00:35.915Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Movable Type (Software Edition)", "vendor": "Six Apart Ltd.", "versions": [ { "status": "affected", "version": "8.0.0 to 8.0.6" }, { "status": "affected", "version": "8.4.0 to 8.4.2 (8 series)" } ] }, { "product": "Movable Type (Software Edition)", "vendor": "Six Apart Ltd.", "versions": [ { "status": "affected", "version": "7 r.5508 and earlier (7 series)" } ] }, { "product": "Movable Type Advanced (Software Edition)", "vendor": "Six Apart Ltd.", "versions": [ { "status": "affected", "version": "8.0.0 to 8.0.6" }, { "status": "affected", "version": "8.4.0 to 8.4.2 (8 series)" } ] }, { "product": "Movable Type Advanced (Software Edition)", "vendor": "Six Apart Ltd.", "versions": [ { "status": "affected", "version": "7 r.5508 and earlier (7 series)" } ] }, { "product": "Movable Type Premium (Software Edition)", "vendor": "Six Apart Ltd.", "versions": [ { "status": "affected", "version": "2.09 and earlier (2 series)" } ] }, { "product": "Movable Type Premium (Software Edition)", "vendor": "Six Apart Ltd.", "versions": [ { "status": "affected", "version": "1.66 and earlier (1 series)" } ] }, { "product": "Movable Type Premium (Advanced Edition) (Software Edition)", "vendor": "Six Apart Ltd.", "versions": [ { "status": "affected", "version": "2.09 and earlier (2 series)" } ] }, { "product": "Movable Type Premium (Advanced Edition) (Software Edition)", "vendor": "Six Apart Ltd.", "versions": [ { "status": "affected", "version": "1.66 and earlier (1 series)" } ] }, { "product": "Movable Type (Cloud Edition)", "vendor": "Six Apart Ltd.", "versions": [ { "status": "affected", "version": "8.6.0 (8 series)" } ] }, { "product": "Movable Type (Cloud Edition)", "vendor": "Six Apart Ltd.", "versions": [ { "status": "affected", "version": "7 r.5508 (7 series)" } ] }, { "product": "Movable Type Premium (Cloud Edition)", "vendor": "Six Apart Ltd.", "versions": [ { "status": "affected", "version": "2.09 (2 series)" } ] }, { "product": "Movable Type Premium (Cloud Edition)", "vendor": "Six Apart Ltd.", "versions": [ { "status": "affected", "version": "1.66 (1 series)" } ] } ], "descriptions": [ { "lang": "en", "value": "Movable Type contains an issue with use of less trusted source. If exploited, tampered email to reset a password may be sent by a remote unauthenticated attacker." } ], "metrics": [ { "cvssV3_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] }, { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", "version": "4.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-348", "description": "Use of less trusted source", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-20T04:22:51.144Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://movabletype.org/news/2025/08/mt-843-released.html" }, { "url": "https://jvn.jp/en/jp/JVN76729865/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2025-53522", "datePublished": "2025-08-20T04:22:51.144Z", "dateReserved": "2025-08-14T05:29:32.466Z", "dateUpdated": "2025-08-20T16:00:35.915Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-58422 (GCVE-0-2025-58422)
Vulnerability from cvelistv5
- CWE-348 - Use of less trusted source
Vendor | Product | Version | ||
---|---|---|---|---|
Ricoh Company, Ltd. | RICOH Streamline NX |
Version: versions 3.5.1 to 24R3 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-58422", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-08T18:38:37.632565Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-08T18:38:49.856Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "RICOH Streamline NX", "vendor": "Ricoh Company, Ltd.", "versions": [ { "status": "affected", "version": "versions 3.5.1 to 24R3" } ] } ], "descriptions": [ { "lang": "en", "value": "RICOH Streamline NX versions 3.5.1 to 24R3 are vulnerable to tampering with operation history. If an attacker can perform a man-in-the-middle attack, they may alter the values of HTTP requests, which could result in tampering with the operation history of the product\u2019s management tool." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] }, { "cvssV4_0": { "baseScore": 2.3, "baseSeverity": "LOW", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", "version": "4.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-348", "description": "Use of less trusted source", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-08T04:43:01.703Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2025-000010" }, { "url": "https://jvn.jp/en/jp/JVN75307484/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2025-58422", "datePublished": "2025-09-08T04:43:01.703Z", "dateReserved": "2025-09-03T06:29:41.944Z", "dateUpdated": "2025-09-08T18:38:49.856Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
No mitigation information available for this CWE.
CAPEC-141: Cache Poisoning
An attacker exploits the functionality of cache technologies to cause specific data to be cached that aids the attackers' objectives. This describes any attack whereby an attacker places incorrect or harmful material in cache. The targeted cache can be an application's cache (e.g. a web browser cache) or a public cache (e.g. a DNS or ARP cache). Until the cache is refreshed, most applications or clients will treat the corrupted cache value as valid. This can lead to a wide range of exploits including redirecting web browsers towards sites that install malware and repeatedly incorrect calculations based on the incorrect value.
CAPEC-142: DNS Cache Poisoning
A domain name server translates a domain name (such as www.example.com) into an IP address that Internet hosts use to contact Internet resources. An adversary modifies a public DNS cache to cause certain names to resolve to incorrect addresses that the adversary specifies. The result is that client applications that rely upon the targeted cache for domain name resolution will be directed not to the actual address of the specified domain name but to some other address. Adversaries can use this to herd clients to sites that install malware on the victim's computer or to masquerade as part of a Pharming attack.
CAPEC-73: User-Controlled Filename
An attack of this type involves an adversary inserting malicious characters (such as a XSS redirection) into a filename, directly or indirectly that is then used by the target software to generate HTML text or other potentially executable content. Many websites rely on user-generated content and dynamically build resources like files, filenames, and URL links directly from user supplied data. In this attack pattern, the attacker uploads code that can execute in the client browser and/or redirect the client browser to a site that the attacker owns. All XSS attack payload variants can be used to pass and exploit these vulnerabilities.
CAPEC-76: Manipulating Web Input to File System Calls
An attacker manipulates inputs to the target software which the target software passes to file system calls in the OS. The goal is to gain access to, and perhaps modify, areas of the file system that the target software did not intend to be accessible.
CAPEC-85: AJAX Footprinting
This attack utilizes the frequent client-server roundtrips in Ajax conversation to scan a system. While Ajax does not open up new vulnerabilities per se, it does optimize them from an attacker point of view. A common first step for an attacker is to footprint the target environment to understand what attacks will work. Since footprinting relies on enumeration, the conversational pattern of rapid, multiple requests and responses that are typical in Ajax applications enable an attacker to look for many vulnerabilities, well-known ports, network locations and so on. The knowledge gained through Ajax fingerprinting can be used to support other attacks, such as XSS.