Cyber Posture

CVE-2025-25535

Critical

Published: 26 March 2025

Published
26 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0078 73.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2025-25535 is a critical HTTP response manipulation vulnerability affecting SCRIPT CASE version 1.0.002 Build7. It enables a remote attacker to escalate privileges through a specially crafted HTTP request, as indicated by its association with CWE-276. The vulnerability received a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), highlighting its severe potential impact due to high confidentiality, integrity, and availability consequences with no prerequisites for exploitation beyond network access.

Any unauthenticated remote attacker can exploit this vulnerability by sending a malicious HTTP request to a vulnerable SCRIPT CASE instance. Successful exploitation allows privilege escalation, potentially granting unauthorized high-level access to the application or underlying system, which could lead to full compromise including data exfiltration, modification, or disruption of services.

Advisories and additional details are available in referenced sources, including a GitHub research repository at https://github.com/simalamuel/Research/tree/main/CVE-2025-25535 and a BeSafe Brasil advisory at https://www.besafebrasil.com.br/script-case-cve-2025-xx-xxxx/, which may provide guidance on detection, patches, or workarounds.

Details

CWE(s)
CWE-276

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The vulnerability is an unauthenticated remote exploit in a public-facing web application (SCRIPT CASE) that directly enables privilege escalation via crafted HTTP requests, mapping to T1190 (Exploit Public-Facing Application) for initial access and T1068 (Exploitation for Privilege Escalation) for the core impact.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References