Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13163: CWE-522 Insufficiently Protected Credentials in Digiwin EasyFlow GP

0
Medium
VulnerabilityCVE-2025-13163cvecve-2025-13163cwe-522
Published: Mon Nov 17 2025 (11/17/2025, 06:17:06 UTC)
Source: CVE Database V5
Vendor/Project: Digiwin
Product: EasyFlow GP

Description

EasyFlow GP developed by Digiwin has an Insufficiently Protected Credentials vulnerability, allowing privileged remote attackers to obtain plaintext database account credentials from the system frontend.

AI-Powered Analysis

AILast updated: 11/17/2025, 06:45:14 UTC

Technical Analysis

CVE-2025-13163 identifies a vulnerability classified under CWE-522 (Insufficiently Protected Credentials) in Digiwin's EasyFlow GP product, specifically affecting versions 5.8.8.3 and all 8.1.* releases. The flaw allows privileged remote attackers to extract plaintext database account credentials directly from the system frontend interface. This vulnerability arises because the application fails to adequately protect sensitive credential information, exposing it in a retrievable form. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L) but necessitating privileged remote access (PR:H). No user interaction (UI:N) or authentication (AT:N) beyond privileged access is needed, and the vulnerability impacts confidentiality heavily (VC:H) without affecting integrity or availability. The scope is unchanged, and no security controls mitigate the vulnerability (SC:N). Although no public exploits are known, the exposure of plaintext credentials could facilitate lateral movement, unauthorized database access, and data exfiltration. The vulnerability was published on November 17, 2025, with no patches currently available, emphasizing the need for immediate risk management. Digiwin EasyFlow GP is used in enterprise resource planning and workflow management, making the confidentiality breach particularly sensitive. The vulnerability's medium CVSS score of 6.9 reflects a balance between the severity of credential exposure and the requirement for privileged access.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive database credentials, potentially leading to unauthorized access to critical business data and systems. Organizations in sectors such as manufacturing, logistics, and enterprise resource planning that rely on Digiwin EasyFlow GP could face data breaches, intellectual property theft, and operational disruption. The exposure of plaintext credentials can facilitate further attacks, including privilege escalation and lateral movement within networks. This risk is heightened in environments where EasyFlow GP interfaces with other critical systems or sensitive data repositories. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially given the medium CVSS score and the potential for targeted attacks by advanced threat actors. European companies with remote privileged access configurations are particularly vulnerable. The impact on regulatory compliance, such as GDPR, could be substantial if personal or sensitive data is compromised due to this vulnerability.

Mitigation Recommendations

1. Immediately restrict privileged remote access to the EasyFlow GP system frontend to trusted administrators only, using network segmentation and firewall rules. 2. Implement strong monitoring and logging of all privileged access to detect suspicious activities or unauthorized attempts to retrieve credentials. 3. Use multi-factor authentication (MFA) for all privileged accounts to reduce the risk of credential misuse. 4. Encrypt sensitive configuration files and credentials at rest and in transit, if possible, to minimize exposure. 5. Regularly audit and rotate database credentials to limit the window of opportunity for attackers. 6. Engage with Digiwin for timely updates and patches; apply them as soon as they become available. 7. Conduct internal penetration testing focusing on credential exposure and privilege escalation paths related to EasyFlow GP. 8. Educate system administrators about the risks of exposing plaintext credentials and enforce secure credential management policies. 9. Consider deploying endpoint detection and response (EDR) solutions to identify anomalous behaviors linked to credential theft. 10. Review and harden the overall security posture of systems integrating with EasyFlow GP to prevent cascading impacts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
twcert
Date Reserved
2025-11-14T03:31:46.149Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691ac33f848ad39aa20115d3

Added to database: 11/17/2025, 6:39:59 AM

Last enriched: 11/17/2025, 6:45:14 AM

Last updated: 11/17/2025, 11:08:20 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats