CVE-2025-63747
Published: 17 November 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2025-63747 is a critical vulnerability in QaTraq 6.9.2, a web application, stemming from default administrative account credentials that are enabled in standard installations. These credentials allow immediate login through the web application's login page, providing full administrative privileges due to the default configuration. The issue is classified under CWE-521 and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), highlighting its severity.
The vulnerability can be exploited by any unauthenticated attacker with network access to the login page, requiring no privileges, user interaction, or special conditions. Upon login with the default credentials, the attacker gains administrative access to the application, enabling potential compromise of confidentiality, integrity, and availability.
Advisories and further details are available from the vendor at http://qatraq.com and an independent analysis at https://bitsbyamg.com/blog/post/2025/10/19/qatraq-692-default-creds-and-file-upload-rce, which security practitioners should review for recommended mitigations and patches.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Default admin credentials (admin:admin) enable use of valid default accounts (T1078.001). Unrestricted authenticated file upload facilitates exploitation of a public-facing web application for RCE via web shell deployment (T1190).