Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0364: CWE-288 Authentication Bypass Using an Alternate Path or Channel in BigAntSoft BigAnt Server

0
Critical
VulnerabilityCVE-2025-0364cvecve-2025-0364cwe-288
Published: Tue Feb 04 2025 (02/04/2025, 17:51:18 UTC)
Source: CVE Database V5
Vendor/Project: BigAntSoft
Product: BigAnt Server

Description

BigAntSoft BigAnt Server, up to and including version 5.6.06, is vulnerable to unauthenticated remote code execution via account registration. An unauthenticated remote attacker can create an administrative user through the default exposed SaaS registration mechanism. Once an administrator, the attacker can upload and execute arbitrary PHP code using the "Cloud Storage Addin," leading to unauthenticated code execution.

AI-Powered Analysis

AILast updated: 11/19/2025, 20:43:34 UTC

Technical Analysis

CVE-2025-0364 is a critical authentication bypass vulnerability classified under CWE-288 affecting BigAntSoft's BigAnt Server software up to version 5.6.06. The flaw arises from the default SaaS registration mechanism, which is exposed and allows unauthenticated remote attackers to create administrative user accounts without any authentication or authorization checks. Once an attacker gains administrative privileges, they can leverage the Cloud Storage Addin feature to upload arbitrary PHP code to the server. This leads to unauthenticated remote code execution (RCE), enabling full system compromise. The vulnerability has a CVSS 3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating it is remotely exploitable over the network without any privileges or user interaction, and impacts confidentiality, integrity, and availability to a high degree. The vulnerability was reserved in early January 2025 and published in February 2025, with no patches or fixes currently available. Although no exploits have been reported in the wild, the simplicity of exploitation and severity make it a critical threat. The vulnerability affects all deployments using the vulnerable versions of BigAnt Server, especially those exposing the SaaS registration interface to the internet or untrusted networks. Attackers can fully compromise affected systems, steal sensitive data, disrupt services, and potentially pivot to internal networks.

Potential Impact

For European organizations, the impact of CVE-2025-0364 is substantial. BigAnt Server is often used in enterprise messaging and collaboration environments, meaning a successful attack could lead to unauthorized access to internal communications, sensitive corporate data, and administrative control over critical infrastructure. The ability to execute arbitrary code remotely without authentication allows attackers to deploy malware, ransomware, or establish persistent backdoors. This can result in data breaches, operational downtime, and reputational damage. Given the high CVSS score and the critical nature of the vulnerability, organizations face risks to confidentiality, integrity, and availability simultaneously. The lack of patches increases the window of exposure, and attackers may target European entities with valuable intellectual property or critical services. Additionally, regulatory implications under GDPR and other data protection laws could lead to significant fines if breaches occur due to this vulnerability.

Mitigation Recommendations

Immediate mitigation steps include disabling or restricting access to the SaaS registration mechanism in BigAnt Server to prevent unauthorized account creation. Organizations should implement strict network segmentation and firewall rules to limit external access to the BigAnt Server, especially the registration and Cloud Storage Addin interfaces. Monitoring and alerting for unusual administrative account creation or privilege escalations should be established. Where possible, deploy Web Application Firewalls (WAFs) to detect and block exploitation attempts targeting the registration endpoint. Until an official patch is released, consider isolating the BigAnt Server from the internet or placing it behind VPN access controls. Conduct thorough audits of existing administrative accounts to identify any unauthorized users. Organizations should also prepare incident response plans specific to this vulnerability and keep abreast of vendor updates for patches or workarounds. Regular backups and integrity checks of critical data are essential to recover from potential compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-01-09T16:09:37.470Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691e29f04d0ffcb40bb6a615

Added to database: 11/19/2025, 8:34:56 PM

Last enriched: 11/19/2025, 8:43:34 PM

Last updated: 11/19/2025, 11:06:49 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats