CVE-2025-59707
Published: 25 March 2026
Description
In N2W before 4.3.2 and 4.4.x before 4.4.1, there is potential remote code execution and account credentials theft because of a spoofing vulnerability.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires timely remediation of flaws such as this spoofing vulnerability via patching to prevent remote code execution and credential theft.
Mandates receiving and implementing vendor security advisories recommending upgrades to patched N2W versions to mitigate this CVE.
Enables proactive detection of the spoofing vulnerability in N2W software through regular vulnerability scanning.
Security SummaryAI
CVE-2025-59707 is a spoofing vulnerability (CWE-290) affecting N2W versions prior to 4.3.2 and 4.4.x prior to 4.4.1. It enables potential remote code execution and theft of account credentials. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low attack complexity, lack of required privileges or user interaction, and high impacts on confidentiality, integrity, and availability.
Unauthenticated remote attackers can exploit this vulnerability over the network with minimal effort. Successful exploitation allows arbitrary code execution on the affected system and exfiltration of account credentials, potentially leading to full system compromise.
Vendor advisories, including the N2WS security advisory update at https://n2ws.com/blog/security-advisory-update and release notes for N2W v4.3.2 at https://n2ws.zendesk.com/hc/en-us/articles/29817965452701-Release-notes-for-N2W-V4-3-2-August-2025, recommend upgrading to N2W 4.3.2 or 4.4.1 as the primary mitigation. Additional details are available at https://www.n2ws.com.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Spoofing vulnerability in public-facing N2W application enables unauthenticated remote code execution (T1190) and account credential theft (T1212).