Cyber Posture

CVE-2025-25570

Critical

Published: 27 February 2025

Published
27 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.2057 95.6th percentile
Risk Priority 32 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.

Security Summary

CVE-2025-25570 is a critical authentication bypass vulnerability in Vue Vben Admin version 2.10.1, stemming from hardcoded credentials that enable unauthorized login to the backend management interface. This issue maps to CWE-522 (Insufficiently Protected Credentials) and CWE-798 (Use of Hard-coded Credentials), earning a CVSS v3.1 base score of 9.8 due to its network accessibility, low attack complexity, and lack of prerequisites like privileges or user interaction.

Remote attackers require only network access to the affected instance, with no authentication or special privileges needed to exploit the flaw. Successful exploitation grants full backend access, allowing high-impact compromise of confidentiality (e.g., data exfiltration), integrity (e.g., data tampering), and availability (e.g., service disruption).

Mitigation details and advisories are referenced in the GitHub repository at https://github.com/Hackerhan/Vben-Admin, where security practitioners should check for patches, updates, or remediation guidance specific to Vue Vben Admin 2.10.1.

Details

CWE(s)
CWE-522CWE-798

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1078.001 Default Accounts Stealth
Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Why these techniques?

Hardcoded credentials enable remote unauthorized access to the public-facing admin interface (T1190) by abusing embedded valid/default credentials (T1078.001) for initial access without authentication.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References