CVE-2025-0744
Published: 30 January 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2025-0744 is an Improper Access Control vulnerability (CWE-284) in EmbedAI versions 2.1 and below. The issue allows an authenticated attacker to change their subscription plan without paying by sending a POST request with modified parameters to the "/demos/embedai/pmt_cash_on_delivery/pay" endpoint. It has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N), indicating high integrity impact with no confidentiality or availability effects.
An authenticated attacker can exploit this vulnerability remotely over the network with low complexity. By crafting and submitting a POST request to the specified endpoint with altered parameters, the attacker can upgrade their subscription tier without completing payment, gaining unauthorized access to premium features.
Mitigation details are available in the INCIBE-CERT advisory at https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai, which covers this and other vulnerabilities in EmbedAI.
Details
- CWE(s)
Affected Products
AI Security Analysis
- AI Category
- Enterprise AI Assistants
- Risk Domain
- Other ATLAS/OWASP Terms
- OWASP Top 10 for LLMs 2025
- None mapped
- MITRE ATLAS Techniques
- None mapped
- Classification Reason
- EmbedAI is a tool for creating chatbots, which qualifies as an enterprise AI assistant platform. The vulnerability is an improper access control in its payment endpoint, but the software is AI-related due to chatbot functionality involving AI/LLM integrations.
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Improper access control enables unauthorized subscription plan changes (account manipulation, T1098) through exploitation of the public-facing web application endpoint (T1190).