Cyber Posture

CVE-2025-60803

Critical

Published: 24 October 2025

Published
24 October 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0029 52.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-60803 is an unauthenticated remote code execution (RCE) vulnerability in Antabot White-Jotter up to commit 9bcadc. The issue stems from the component /api/aaa;/../register and is classified under CWE-78 (OS Command Injection). It received a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility and lack of prerequisites.

Any unauthenticated attacker with network access to the vulnerable instance can exploit this flaw without user interaction. Successful exploitation enables arbitrary code execution on the server, potentially compromising confidentiality, integrity, and availability with high impact.

Mitigation details and further information are available in the GitHub issue at https://github.com/Antabot/White-Jotter/issues/162.

Details

CWE(s)
CWE-78

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Unauthenticated remote code execution vulnerability in a public-facing web application API endpoint via OS command injection directly enables exploitation of public-facing applications (T1190).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References