CVE-2025-60534
Published: 06 January 2026
Description
Blue Access Cobalt v02.000.195 suffers from an authentication bypass vulnerability, which allows an attacker to selectively proxy requests in order to operate functionality on the web application without the need to authenticate with legitimate credentials.
Mitigating Controls (NIST 800-53 r5)AI
Explicitly identifies and authorizes only specific actions performable without identification or authentication, preventing attackers from proxying requests to unauthorized web application functionality.
Enforces approved authorizations for access to system resources, directly countering the authentication bypass by ensuring logical access controls are comprehensively applied.
Requires identification and authentication for non-organizational users, mitigating remote unauthenticated exploitation of the web application via proxied requests.
Security SummaryAI
CVE-2025-60534 is an authentication bypass vulnerability in Blue Access Cobalt v02.000.195. The issue allows an attacker to selectively proxy requests to operate functionality on the associated web application without authenticating using legitimate credentials. It is classified under CWE-287 (Improper Authentication) and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low complexity, and high impacts across confidentiality, integrity, and availability.
An unauthenticated attacker with network access can exploit this vulnerability remotely without privileges or user interaction. By proxying requests, the attacker bypasses authentication controls to execute arbitrary functionality on the web application, potentially achieving full unauthorized control over affected operations.
Advisories and additional details are referenced at http://blue.com and https://github.com/PilotPatrickk/Published-CVEs/blob/main/CVE-2025-60534.md, published on 2026-01-06.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE-2025-60534 enables unauthenticated attackers to bypass authentication on a public-facing web application by proxying requests, directly facilitating T1190: Exploit Public-Facing Application.