Cyber Posture

CVE-2025-63747

CriticalPublic PoC

Published: 17 November 2025

Published
17 November 2025
Modified
26 November 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0008 23.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-63747 is a critical vulnerability in QaTraq 6.9.2, a web application, stemming from default administrative account credentials that are enabled in standard installations. These credentials allow immediate login through the web application's login page, providing full administrative privileges due to the default configuration. The issue is classified under CWE-521 and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), highlighting its severity.

The vulnerability can be exploited by any unauthenticated attacker with network access to the login page, requiring no privileges, user interaction, or special conditions. Upon login with the default credentials, the attacker gains administrative access to the application, enabling potential compromise of confidentiality, integrity, and availability.

Advisories and further details are available from the vendor at http://qatraq.com and an independent analysis at https://bitsbyamg.com/blog/post/2025/10/19/qatraq-692-default-creds-and-file-upload-rce, which security practitioners should review for recommended mitigations and patches.

Details

CWE(s)
CWE-521

Affected Products

testmanagement
qatraq
6.9.2

MITRE ATT&CK Enterprise Techniques

T1078.001 Default Accounts Stealth
Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Default admin credentials (admin:admin) enable use of valid default accounts (T1078.001). Unrestricted authenticated file upload facilitates exploitation of a public-facing web application for RCE via web shell deployment (T1190).

References