Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12461: CWE-522 Insufficiently Protected Credentials in Grupo Castilla Epsilon RH

0
Medium
VulnerabilityCVE-2025-12461cvecve-2025-12461cwe-522
Published: Wed Oct 29 2025 (10/29/2025, 10:51:36 UTC)
Source: CVE Database V5
Vendor/Project: Grupo Castilla
Product: Epsilon RH

Description

This vulnerability allows an attacker to access parts of the application that are not protected by any type of access control. The attacker could access this path ‘…/epsilonnet/License/About.aspx’ and obtain information on both the licence and the configuration of the product by knowing which modules are installed.

AI-Powered Analysis

AILast updated: 10/29/2025, 11:21:07 UTC

Technical Analysis

CVE-2025-12461 is a vulnerability classified under CWE-522 (Insufficiently Protected Credentials) affecting Grupo Castilla's Epsilon RH product, specifically version 3.03.36.0185. The flaw arises from a lack of access control on the application path ‘…/epsilonnet/License/About.aspx’, which allows unauthenticated attackers to retrieve sensitive information about the software license and configuration, including details on installed modules. This information disclosure can facilitate attackers in understanding the target environment, potentially enabling more sophisticated attacks or exploitation of other vulnerabilities. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N) reflects that the attack can be performed over the network with low complexity and no privileges or user interaction required, but the impact is limited to confidentiality loss of license and configuration data. No patches or known exploits have been reported yet, but the exposure of internal configuration details can be leveraged in targeted attacks or social engineering. The vulnerability was assigned and published by INCIBE on October 29, 2025.

Potential Impact

For European organizations using Grupo Castilla's Epsilon RH, this vulnerability poses a risk of unauthorized disclosure of sensitive license and configuration information. Such data leakage can undermine confidentiality, potentially revealing internal software deployment details that attackers can use to tailor attacks or identify other vulnerabilities. While the vulnerability does not directly compromise system integrity or availability, the exposed information could facilitate lateral movement or privilege escalation attempts. Organizations in sectors with strict data protection requirements, such as finance, healthcare, or government, may face compliance risks if this information is leveraged in broader attacks. The ease of exploitation without authentication increases the likelihood of reconnaissance activities by malicious actors. Although no active exploits are known, the vulnerability could be targeted by opportunistic attackers or incorporated into multi-stage attack chains, especially in environments where Epsilon RH is widely deployed.

Mitigation Recommendations

To mitigate CVE-2025-12461, organizations should immediately review and restrict access controls on the ‘…/epsilonnet/License/About.aspx’ endpoint to ensure it is not accessible without proper authentication and authorization. Implementing role-based access control (RBAC) or similar mechanisms to protect sensitive application paths is critical. Network-level controls such as web application firewalls (WAFs) can be configured to block unauthorized requests to this path. Monitoring and logging access to sensitive URLs should be enhanced to detect and respond to suspicious activity promptly. If possible, upgrade to a patched version once available or apply vendor-provided workarounds. Conduct internal audits of the application to identify other endpoints lacking adequate access controls. Additionally, educate IT staff and users about the risks of information disclosure and ensure that sensitive configuration details are not unnecessarily exposed in application responses or error messages.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2025-10-29T10:23:47.181Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6901f6a28cf71dc7fdc086b5

Added to database: 10/29/2025, 11:12:34 AM

Last enriched: 10/29/2025, 11:21:07 AM

Last updated: 10/30/2025, 3:46:58 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats