CVE-2025-25268

Severity
8.8HIGH
EPSS
0.0%
top 91.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 8

Description

An unauthenticated adjacent attacker can modify configuration by sending specific requests to an API-endpoint resulting in read and write access due to missing authentication.

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages8 packages

CVEListV5phoenix_contact/charx_sec-30000.0.01.7.3
CVEListV5phoenix_contact/charx_sec-30500.0.01.7.3
CVEListV5phoenix_contact/charx_sec-31000.0.01.7.3
CVEListV5phoenix_contact/charx_sec-31500.0.01.7.3

🔴Vulnerability Details

2
GHSA
GHSA-9x27-gx66-668w: An unauthenticated adjacent attacker can modify configuration by sending specific requests to an API-endpoint resulting in read and write access due t2025-07-08
CVEList
Unauthenticated Configuration Access via Exposed API Endpoint2025-07-08
CVE-2025-25268 (HIGH CVSS 8.8) | An unauthenticated adjacent attacke | cvebase.io