Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13164: CWE-522 Insufficiently Protected Credentials in Digiwin EasyFlow GP

0
Medium
VulnerabilityCVE-2025-13164cvecve-2025-13164cwe-522
Published: Mon Nov 17 2025 (11/17/2025, 06:23:21 UTC)
Source: CVE Database V5
Vendor/Project: Digiwin
Product: EasyFlow GP

Description

EasyFlow GP developed by Digiwin has an Insufficiently Protected Credentials vulnerability, allowing privileged remote attackers to obtain plaintext credentials of AD and system mail from the system frontend.

AI-Powered Analysis

AILast updated: 11/17/2025, 06:45:28 UTC

Technical Analysis

CVE-2025-13164 is a vulnerability classified under CWE-522 (Insufficiently Protected Credentials) affecting Digiwin's EasyFlow GP product, specifically version 5.8.8.3. The flaw allows privileged remote attackers to extract plaintext credentials for Active Directory (AD) and system mail accounts directly from the system frontend interface. This indicates that the application stores or transmits sensitive credentials without adequate encryption or protection, exposing them to unauthorized retrieval by attackers with elevated privileges. The CVSS 4.0 base score is 6.9, reflecting a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no authentication required (AT:N), and privileges required (PR:H). The vulnerability impacts confidentiality heavily (VC:H) but does not affect integrity or availability. There is no user interaction needed, and the scope is unchanged. The vulnerability was published on November 17, 2025, with no known exploits in the wild and no patches currently available. The technical details suggest that the issue arises from poor credential management practices within EasyFlow GP, potentially involving plaintext storage or transmission of AD and mail system credentials. This vulnerability could be leveraged by attackers who have already gained privileged remote access to the system to further compromise network resources by harvesting credentials for lateral movement or privilege escalation. The lack of patches necessitates immediate mitigation through access control and monitoring until vendor fixes are released.

Potential Impact

For European organizations, the primary impact of CVE-2025-13164 lies in the potential compromise of Active Directory and system mail credentials, which are critical for identity and access management as well as communication infrastructure. Exposure of these credentials can lead to unauthorized access to sensitive systems, enabling attackers to move laterally within corporate networks, escalate privileges, and potentially exfiltrate data or disrupt operations. Organizations in sectors such as finance, manufacturing, government, and critical infrastructure that rely heavily on Digiwin EasyFlow GP for workflow automation and integration with AD and mail systems are at heightened risk. The confidentiality breach could undermine trust and compliance with data protection regulations such as GDPR, leading to legal and financial repercussions. Since the vulnerability requires privileged access, the initial compromise vector might be through other means, but once exploited, it significantly increases the attack surface and risk of widespread compromise. The absence of known exploits reduces immediate risk, but the medium severity score and sensitive nature of the credentials involved warrant proactive defense measures.

Mitigation Recommendations

1. Restrict privileged remote access to Digiwin EasyFlow GP systems strictly to trusted administrators and secure networks using VPNs and multi-factor authentication. 2. Implement robust monitoring and alerting for any access or extraction attempts related to credential storage or frontend interfaces. 3. Enforce the principle of least privilege to minimize the number of users with elevated access capable of exploiting this vulnerability. 4. Conduct regular audits of credential storage and transmission mechanisms within EasyFlow GP environments to identify insecure practices. 5. Isolate EasyFlow GP systems from critical AD and mail infrastructure where possible to limit credential exposure. 6. Engage with Digiwin to obtain timelines for patches or workarounds and apply updates promptly once available. 7. Consider deploying additional encryption or credential vaulting solutions to protect sensitive credentials externally until vendor fixes are released. 8. Train administrators on secure credential handling and the risks associated with this vulnerability to prevent inadvertent exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
twcert
Date Reserved
2025-11-14T03:31:47.608Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691ac33f848ad39aa20115d7

Added to database: 11/17/2025, 6:39:59 AM

Last enriched: 11/17/2025, 6:45:28 AM

Last updated: 11/17/2025, 9:00:11 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats