Cyber Posture

CVE-2025-56422

Critical

Published: 10 March 2026

Published
10 March 2026
Modified
20 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0019 40.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

A deserialization vulnerability in LimeSurvey before v6.15.0+250623 allows a remote attacker to execute arbitrary code on the server.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely identification, reporting, and remediation of critical software flaws like this deserialization vulnerability via patching to LimeSurvey v6.15.0+250623 or later.

prevent

Mandates validation of untrusted inputs to prevent processing of malicious deserialization payloads by remote unauthenticated attackers.

detect

Enables vulnerability scanning and monitoring to identify the deserialization flaw in LimeSurvey instances for prioritized remediation.

Security SummaryAI

CVE-2025-56422 is a deserialization vulnerability (CWE-502) affecting LimeSurvey versions prior to v6.15.0+250623. Published on 2026-03-10, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for high-impact exploitation across confidentiality, integrity, and availability.

The vulnerability enables a remote, unauthenticated attacker to execute arbitrary code on the affected server with low attack complexity and no user interaction required. Exploitation occurs over the network, allowing attackers without privileges to compromise the LimeSurvey instance fully.

Mitigation involves upgrading to LimeSurvey v6.15.0+250623 or later. Additional details are available in advisories from the vendor at http://limesurvey.com and a security advisory at https://github.com/hongancalif/security-advisories/blob/main/CVE-2025-56422.md.

Details

CWE(s)

Affected Products

limesurvey
limesurvey
≤ 6.14.3

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability allows remote unauthenticated arbitrary code execution on a public-facing web application (LimeSurvey), directly mapping to exploitation of public-facing applications for initial access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References