Cyber Posture

CVE-2025-25589

High

Published: 18 March 2025

Published
18 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0013 32.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2025-25589 is an XML external entity (XXE) injection vulnerability, mapped to CWE-91, in the /weixin/aes/XMLParse.java component of yimioa versions prior to v2024.07.04. Published on 2025-03-18T16:15:27.200, it carries a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). The issue enables attackers to execute arbitrary code by supplying a crafted XML file to the vulnerable parser.

Attackers with low privileges can exploit this over the network with low complexity and no user interaction. Exploitation leads to high confidentiality and integrity impacts through arbitrary code execution, without affecting availability or changing scope.

The referenced advisory at https://gitee.com/r1bbit/yimioa/issues/IBI81R provides details on the issue, with mitigation achieved by upgrading to yimioa v2024.07.04 or later.

Details

CWE(s)
CWE-91

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

XXE vulnerability in public-facing web app component allows remote low-privilege attackers to supply crafted XML leading to arbitrary code execution, directly enabling exploitation of public-facing applications and privilege escalation via the resulting code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References