CVE-2025-0364: CWE-288 Authentication Bypass Using an Alternate Path or Channel in BigAntSoft BigAnt Server
BigAntSoft BigAnt Server, up to and including version 5.6.06, is vulnerable to unauthenticated remote code execution via account registration. An unauthenticated remote attacker can create an administrative user through the default exposed SaaS registration mechanism. Once an administrator, the attacker can upload and execute arbitrary PHP code using the "Cloud Storage Addin," leading to unauthenticated code execution.
AI Analysis
Technical Summary
CVE-2025-0364 is a critical authentication bypass vulnerability classified under CWE-288 affecting BigAntSoft's BigAnt Server software up to version 5.6.06. The flaw arises from the default SaaS registration mechanism, which is exposed and allows unauthenticated remote attackers to create administrative user accounts without any authentication or authorization checks. Once an attacker gains administrative privileges, they can leverage the Cloud Storage Addin feature to upload arbitrary PHP code to the server. This leads to unauthenticated remote code execution (RCE), enabling full system compromise. The vulnerability has a CVSS 3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating it is remotely exploitable over the network without any privileges or user interaction, and impacts confidentiality, integrity, and availability to a high degree. The vulnerability was reserved in early January 2025 and published in February 2025, with no patches or fixes currently available. Although no exploits have been reported in the wild, the simplicity of exploitation and severity make it a critical threat. The vulnerability affects all deployments using the vulnerable versions of BigAnt Server, especially those exposing the SaaS registration interface to the internet or untrusted networks. Attackers can fully compromise affected systems, steal sensitive data, disrupt services, and potentially pivot to internal networks.
Potential Impact
For European organizations, the impact of CVE-2025-0364 is substantial. BigAnt Server is often used in enterprise messaging and collaboration environments, meaning a successful attack could lead to unauthorized access to internal communications, sensitive corporate data, and administrative control over critical infrastructure. The ability to execute arbitrary code remotely without authentication allows attackers to deploy malware, ransomware, or establish persistent backdoors. This can result in data breaches, operational downtime, and reputational damage. Given the high CVSS score and the critical nature of the vulnerability, organizations face risks to confidentiality, integrity, and availability simultaneously. The lack of patches increases the window of exposure, and attackers may target European entities with valuable intellectual property or critical services. Additionally, regulatory implications under GDPR and other data protection laws could lead to significant fines if breaches occur due to this vulnerability.
Mitigation Recommendations
Immediate mitigation steps include disabling or restricting access to the SaaS registration mechanism in BigAnt Server to prevent unauthorized account creation. Organizations should implement strict network segmentation and firewall rules to limit external access to the BigAnt Server, especially the registration and Cloud Storage Addin interfaces. Monitoring and alerting for unusual administrative account creation or privilege escalations should be established. Where possible, deploy Web Application Firewalls (WAFs) to detect and block exploitation attempts targeting the registration endpoint. Until an official patch is released, consider isolating the BigAnt Server from the internet or placing it behind VPN access controls. Conduct thorough audits of existing administrative accounts to identify any unauthorized users. Organizations should also prepare incident response plans specific to this vulnerability and keep abreast of vendor updates for patches or workarounds. Regular backups and integrity checks of critical data are essential to recover from potential compromises.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands
CVE-2025-0364: CWE-288 Authentication Bypass Using an Alternate Path or Channel in BigAntSoft BigAnt Server
Description
BigAntSoft BigAnt Server, up to and including version 5.6.06, is vulnerable to unauthenticated remote code execution via account registration. An unauthenticated remote attacker can create an administrative user through the default exposed SaaS registration mechanism. Once an administrator, the attacker can upload and execute arbitrary PHP code using the "Cloud Storage Addin," leading to unauthenticated code execution.
AI-Powered Analysis
Technical Analysis
CVE-2025-0364 is a critical authentication bypass vulnerability classified under CWE-288 affecting BigAntSoft's BigAnt Server software up to version 5.6.06. The flaw arises from the default SaaS registration mechanism, which is exposed and allows unauthenticated remote attackers to create administrative user accounts without any authentication or authorization checks. Once an attacker gains administrative privileges, they can leverage the Cloud Storage Addin feature to upload arbitrary PHP code to the server. This leads to unauthenticated remote code execution (RCE), enabling full system compromise. The vulnerability has a CVSS 3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating it is remotely exploitable over the network without any privileges or user interaction, and impacts confidentiality, integrity, and availability to a high degree. The vulnerability was reserved in early January 2025 and published in February 2025, with no patches or fixes currently available. Although no exploits have been reported in the wild, the simplicity of exploitation and severity make it a critical threat. The vulnerability affects all deployments using the vulnerable versions of BigAnt Server, especially those exposing the SaaS registration interface to the internet or untrusted networks. Attackers can fully compromise affected systems, steal sensitive data, disrupt services, and potentially pivot to internal networks.
Potential Impact
For European organizations, the impact of CVE-2025-0364 is substantial. BigAnt Server is often used in enterprise messaging and collaboration environments, meaning a successful attack could lead to unauthorized access to internal communications, sensitive corporate data, and administrative control over critical infrastructure. The ability to execute arbitrary code remotely without authentication allows attackers to deploy malware, ransomware, or establish persistent backdoors. This can result in data breaches, operational downtime, and reputational damage. Given the high CVSS score and the critical nature of the vulnerability, organizations face risks to confidentiality, integrity, and availability simultaneously. The lack of patches increases the window of exposure, and attackers may target European entities with valuable intellectual property or critical services. Additionally, regulatory implications under GDPR and other data protection laws could lead to significant fines if breaches occur due to this vulnerability.
Mitigation Recommendations
Immediate mitigation steps include disabling or restricting access to the SaaS registration mechanism in BigAnt Server to prevent unauthorized account creation. Organizations should implement strict network segmentation and firewall rules to limit external access to the BigAnt Server, especially the registration and Cloud Storage Addin interfaces. Monitoring and alerting for unusual administrative account creation or privilege escalations should be established. Where possible, deploy Web Application Firewalls (WAFs) to detect and block exploitation attempts targeting the registration endpoint. Until an official patch is released, consider isolating the BigAnt Server from the internet or placing it behind VPN access controls. Conduct thorough audits of existing administrative accounts to identify any unauthorized users. Organizations should also prepare incident response plans specific to this vulnerability and keep abreast of vendor updates for patches or workarounds. Regular backups and integrity checks of critical data are essential to recover from potential compromises.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-01-09T16:09:37.470Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691e29f04d0ffcb40bb6a615
Added to database: 11/19/2025, 8:34:56 PM
Last enriched: 11/19/2025, 8:43:34 PM
Last updated: 11/19/2025, 11:06:49 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13420: SQL Injection in itsourcecode Human Resource Management System
MediumCVE-2025-4042
UnknownCVE-2025-13415: Cross Site Scripting in icret EasyImages
MediumCVE-2025-11884: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in OpenText™ uCMDB
LowCVE-2025-63719: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.