va-25-174-01
Vulnerability from csaf_cisa
Published
2025-07-31 17:01
Modified
2025-09-09 21:12
Summary
OPEXUS FOIAXpress Public Access Link (PAL) multiple vulnerabilities
Notes
Legal Notice
All information products included in [https://github.com/cisagov/CSAF/tree/develop/csaf_files/IT/white](https://github.com/cisagov/CSAF/tree/develop/csaf_files/IT/white) are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see [https://us-cert.cisa.gov/tlp/](https://us-cert.cisa.gov/tlp/).
Countries and Areas Deployed
Worldwide
Critical Infrastructure Sectors
Information Technology
Risk Evaluation
Multiple vulnerabilities could allow unauthenticated attackers to bypass rate-limiting measures for login attempts, or check for the existence of other users. Low-privileged users can modify certain site content without authorization.
Recommended Practices
Upgrade to OPEXUS FOIAXpress PAL version 11.12.3.0.
Company Headquarters Location
United States
Vendor Statement
Per OPEXUS:
The vulnerability has been addressed and resolved in the June 2025 release, version 11.12.3.0
CAPTCHA Bypass - Resolved
SQL Injection - Resolved
Email HTML Injection - Resolved
https://docs.opexustech.com/docs/foiaxpress/11.12.0/FOIAXpress_Release_Notes_11.12.3.0.pdf
{ "document": { "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "en-US", "notes": [ { "category": "legal_disclaimer", "text": "All information products included in [https://github.com/cisagov/CSAF/tree/develop/csaf_files/IT/white](https://github.com/cisagov/CSAF/tree/develop/csaf_files/IT/white) are provided \\\"as is\\\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see [https://us-cert.cisa.gov/tlp/](https://us-cert.cisa.gov/tlp/).", "title": "Legal Notice" }, { "category": "other", "text": "Worldwide", "title": "Countries and Areas Deployed" }, { "category": "other", "text": "Information Technology", "title": "Critical Infrastructure Sectors" }, { "category": "summary", "text": "Multiple vulnerabilities could allow unauthenticated attackers to bypass rate-limiting measures for login attempts, or check for the existence of other users. Low-privileged users can modify certain site content without authorization.", "title": "Risk Evaluation" }, { "category": "general", "text": "Upgrade to OPEXUS FOIAXpress PAL version 11.12.3.0.", "title": "Recommended Practices" }, { "category": "other", "text": "United States", "title": "Company Headquarters Location" }, { "category": "description", "text": "Per OPEXUS: \n\nThe vulnerability has been addressed and resolved in the June 2025 release, version 11.12.3.0\n \nCAPTCHA Bypass - Resolved\nSQL Injection - Resolved\nEmail HTML Injection - Resolved\n \nhttps://docs.opexustech.com/docs/foiaxpress/11.12.0/FOIAXpress_Release_Notes_11.12.3.0.pdf", "title": "Vendor Statement" } ], "publisher": { "category": "coordinator", "contact_details": "https://www.cisa.gov/report", "issuing_authority": "CISA", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "Vulnerability Advisory VA-25-174-01 CSAF", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-174-01.json" } ], "title": "OPEXUS FOIAXpress Public Access Link (PAL) multiple vulnerabilities", "tracking": { "current_release_date": "2025-09-09T21:12:34Z", "generator": { "engine": { "name": "VINCE-NT", "version": "1.10.0" } }, "id": "VA-25-174-01", "initial_release_date": "2025-07-31T17:01:09Z", "revision_history": [ { "date": "2025-09-09T21:12:34Z", "number": "1.1.1", "summary": "Updated title" }, { "date": "2025-08-07T18:50:18Z", "number": "1.1.0", "summary": "Updated SSVC" }, { "date": "2025-07-31T17:01:09Z", "number": "1.0.0", "summary": "Initial publication" } ], "status": "final", "version": "1.1.1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e=11.1.0|\u003c11.12.3.0", "product": { "name": "OPEXUS FOIAXpress Public Access Link (PAL) \u003e=11.1.0|\u003c11.12.3.0", "product_id": "CSAFPID-0001" } }, { "category": "product_version", "name": "11.12.3.0", "product": { "name": "OPEXUS FOIAXpress Public Access Link (PAL) 11.12.3.0", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "FOIAXpress Public Access Link (PAL)" } ], "category": "vendor", "name": "OPEXUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Nathan Spidle" ], "organization": "CISA" } ], "cve": "CVE-2025-54832", "cwe": { "id": "CWE-472", "name": "External Control of Assumed-Immutable Web Parameter" }, "notes": [ { "category": "summary", "text": "OPEXUS FOIAXpress Public Access Link (PAL), version v11.1.0, allows an authenticated user to add entries to the list of states and territories.", "title": "Description" }, { "category": "details", "text": "SSVCv2/E:N/A:N/T:P/2025-08-07T18:43:30Z/", "title": "SSVC" }, { "category": "description", "text": "Per OPEXUS: \"The vulnerability has been addressed and resolved in the June 2025 release, version 11.12.3.0\"", "title": "Vendor statement from OPEXUS" } ], "product_status": { "fixed": [ "CSAFPID-0002" ], "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "Vulnerability Advisory VA-25-174-01 CSAF", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-174-01.json" }, { "category": "external", "summary": "CVE-2025-54832", "url": "https://www.cve.org/CVERecord?id=CVE-2025-54832" }, { "category": "external", "summary": "FOIAXpress Release Notes V11.12.3.0", "url": "https://docs.opexustech.com/docs/foiaxpress/11.12.0/FOIAXpress_Release_notes_11.12.3.0.pdf" } ], "release_date": "2025-06-30T00:00:00Z", "remediations": [ { "category": "vendor_fix", "date": "2025-06-30T00:00:00Z", "details": "Fixed in 11.12.3.0.", "product_ids": [ "CSAFPID-0001" ], "url": "https://docs.opexustech.com/docs/foiaxpress/11.12.0/FOIAXpress_Release_notes_11.12.3.0.pdf" }, { "category": "vendor_fix", "date": "2025-06-30T00:00:00Z", "details": "Fixed in 11.12.3.0.", "product_ids": [ "CSAFPID-0002" ], "url": "https://docs.opexustech.com/docs/foiaxpress/11.12.0/FOIAXpress_Release_notes_11.12.3.0.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "OPEXUS FOIAXpress Public Access Link (PAL) state and territory list unauthorized modification" }, { "acknowledgments": [ { "names": [ "Nathan Spidle" ], "organization": "CISA" } ], "cve": "CVE-2025-54833", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "notes": [ { "category": "summary", "text": "OPEXUS FOIAXpress Public Access Link (PAL) version v11.1.0 allows attackers to bypass account-lockout and CAPTCHA protections. Unauthenticated remote attackers can more easily brute force passwords.", "title": "Description" }, { "category": "details", "text": "SSVCv2/E:N/A:Y/T:P/2025-08-07T18:40:46Z/", "title": "SSVC" }, { "category": "description", "text": "Per OPEXUS: \"Reference: frekimite-84 CAPTCHA Bypass on PalLogin.aspx in PAL application. v11.12.3.0 Release fix the vulnerability.\"", "title": "Vendor statement from OPEXUS" } ], "product_status": { "fixed": [ "CSAFPID-0002" ], "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "Vulnerability Advisory VA-25-174-01 CSAF", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-174-01.json" }, { "category": "external", "summary": "CVE-2025-54833", "url": "https://www.cve.org/CVERecord?id=CVE-2025-54833" }, { "category": "external", "summary": "FOIAXpress Release Notes V11.12.3.0", "url": "https://docs.opexustech.com/docs/foiaxpress/11.12.0/FOIAXpress_Release_notes_11.12.3.0.pdf" } ], "release_date": "2025-06-30T00:00:00Z", "remediations": [ { "category": "vendor_fix", "date": "2025-06-30T00:00:00Z", "details": "Fixed in 11.12.3.0.", "product_ids": [ "CSAFPID-0001" ], "url": "https://docs.opexustech.com/docs/foiaxpress/11.12.0/FOIAXpress_Release_notes_11.12.3.0.pdf" }, { "category": "vendor_fix", "date": "2025-06-30T00:00:00Z", "details": "Fixed in 11.12.3.0.", "product_ids": [ "CSAFPID-0002" ], "url": "https://docs.opexustech.com/docs/foiaxpress/11.12.0/FOIAXpress_Release_notes_11.12.3.0.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "OPEXUS FOIAXpress Public Access Link (PAL) account-lockout and CAPTCHA protection bypass" }, { "acknowledgments": [ { "names": [ "Nathan Spidle" ], "organization": "CISA" } ], "cve": "CVE-2025-54834", "cwe": { "id": "CWE-204", "name": "Observable Response Discrepancy" }, "notes": [ { "category": "summary", "text": "OPEXUS FOIAXpress Public Access Link (PAL) version v11.1.0 allows an unauthenticated, remote attacker to query the /App/CreateRequest.aspx endpoint to check for the existence of valid usernames. There are no rate-limiting mechanisms in place.", "title": "Description" }, { "category": "details", "text": "SSVCv2/E:P/A:Y/T:P/2025-06-12T17:01:51Z/", "title": "SSVC" }, { "category": "description", "text": "Per OPEXUS: \"The vulnerability has been addressed and resolved in the June 2025 release, version 11.12.3.0\"", "title": "Vendor statement from OPEXUS" } ], "product_status": { "fixed": [ "CSAFPID-0002" ], "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "Vulnerability Advisory VA-25-174-01 CSAF", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-174-01.json" }, { "category": "external", "summary": "CVE-2025-54834", "url": "https://www.cve.org/CVERecord?id=CVE-2025-54834" }, { "category": "external", "summary": "FOIAXpress Release Notes V11.12.3.0", "url": "https://docs.opexustech.com/docs/foiaxpress/11.12.0/FOIAXpress_Release_notes_11.12.3.0.pdf" } ], "release_date": "2025-06-30T00:00:00Z", "remediations": [ { "category": "vendor_fix", "date": "2025-06-30T00:00:00Z", "details": "Fixed in 11.12.3.0.", "product_ids": [ "CSAFPID-0001" ], "url": "https://docs.opexustech.com/docs/foiaxpress/11.12.0/FOIAXpress_Release_notes_11.12.3.0.pdf" }, { "category": "vendor_fix", "date": "2025-06-30T00:00:00Z", "details": "Fixed in 11.12.3.0.", "product_ids": [ "CSAFPID-0002" ], "url": "https://docs.opexustech.com/docs/foiaxpress/11.12.0/FOIAXpress_Release_notes_11.12.3.0.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "OPEXUS FOIAXpress Public Access Link (PAL) unauthenticated username enumeration" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…