Cyber Posture

CVE-2025-0744

High

Published: 30 January 2025

Published
30 January 2025
Modified
08 October 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score 0.0007 22.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-0744 is an Improper Access Control vulnerability (CWE-284) in EmbedAI versions 2.1 and below. The issue allows an authenticated attacker to change their subscription plan without paying by sending a POST request with modified parameters to the "/demos/embedai/pmt_cash_on_delivery/pay" endpoint. It has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N), indicating high integrity impact with no confidentiality or availability effects.

An authenticated attacker can exploit this vulnerability remotely over the network with low complexity. By crafting and submitting a POST request to the specified endpoint with altered parameters, the attacker can upgrade their subscription tier without completing payment, gaining unauthorized access to premium features.

Mitigation details are available in the INCIBE-CERT advisory at https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai, which covers this and other vulnerabilities in EmbedAI.

Details

CWE(s)
CWE-284

Affected Products

thesamur
embedai
≤ 2.1

AI Security Analysis

AI Category
Enterprise AI Assistants
Risk Domain
Other ATLAS/OWASP Terms
OWASP Top 10 for LLMs 2025
None mapped
MITRE ATLAS Techniques
None mapped
Classification Reason
EmbedAI is a tool for creating chatbots, which qualifies as an enterprise AI assistant platform. The vulnerability is an improper access control in its payment endpoint, but the software is AI-related due to chatbot functionality involving AI/LLM integrations.

MITRE ATT&CK Enterprise Techniques

T1098 Account Manipulation Persistence
Adversaries may manipulate accounts to maintain and/or elevate access to victim systems.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Improper access control enables unauthorized subscription plan changes (account manipulation, T1098) through exploitation of the public-facing web application endpoint (T1190).

References