Cyber Posture

CVE-2018-25332

CriticalPublic PoC

Published: 17 May 2026

Published
17 May 2026
Modified
18 May 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0020 42.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2018-25332 is a critical-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Szurek (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, ranked at the 42.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-306

Requires established identification and authentication to unlock, mitigating missing authentication for continued system access.

addresses: CWE-306

Requiring identification and rationale for actions allowed without authentication ensures critical functions are not left unprotected by forcing review of authentication requirements.

addresses: CWE-306

Authorizing mobile device connections to organizational systems ensures authentication is performed for this critical access function.

addresses: CWE-306

Guarantees critical functions are protected by mandatory invocation of the access control mechanism.

addresses: CWE-306

Auditing sessions makes it possible to detect access to critical functions without required authentication.

addresses: CWE-306

The assessment process confirms authentication is present and effective for critical functions, preventing exploitation from missing authentication.

addresses: CWE-306

Certification assesses that critical functions have required authentication controls in place.

addresses: CWE-306

Disabling non-essential functions and services eliminates the need to secure them, reducing exposure from missing authentication on unnecessary components.

NVD Description

GitBucket 4.23.1 contains an unauthenticated remote code execution vulnerability that allows attackers to execute arbitrary commands by exploiting weak secret token generation and insecure file upload functionality. Attackers can brute-force the Blowfish encryption key, upload a malicious JAR plugin via…

more

the git-lfs endpoint, and execute system commands through an exposed exploit endpoint.

Deeper analysisAI

Automated synthesis unavailable for this CVE.

Details

CWE(s)

Affected Products

Szurek
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-26340Shared CWE-306
CVE-2026-35064Shared CWE-306
CVE-2025-53378Shared CWE-306
CVE-2025-1272Shared CWE-306
CVE-2025-54816Shared CWE-306
CVE-2025-0108Shared CWE-306
CVE-2025-59695Shared CWE-306
CVE-2026-39987Shared CWE-306
CVE-2025-53072Shared CWE-306
CVE-2026-26125Shared CWE-306

References