CVE-2025-14198: Information Disclosure
A vulnerability was detected in Verysync 微力同步 2.21.3. This affects an unknown function of the file /safebrowsing/clientreport/download?key=dummytoken of the component Web Administration Module. Performing manipulation results in information disclosure. The attack is possible to be carried out remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-14198 is a medium-severity information disclosure vulnerability affecting Verysync 微力同步 version 2.21.3. The vulnerability resides in an unspecified function within the Web Administration Module, specifically the /safebrowsing/clientreport/download endpoint, which accepts a 'key' parameter (demonstrated with 'dummytoken'). By manipulating requests to this endpoint remotely, an attacker can cause the system to leak sensitive information. The vulnerability requires no authentication, user interaction, or privileges, making it remotely exploitable over the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P) indicates low complexity and no required privileges or user interaction, with partial confidentiality impact but no integrity or availability impact. Although the vendor was notified early, they have not responded or issued a patch, and exploit code is publicly available, increasing the risk of exploitation. The exact nature of the leaked information is unspecified, but given the module's role in web administration and safebrowsing reporting, it could include sensitive configuration or usage data. No known active exploitation has been reported yet, but the public availability of exploits elevates the threat level. Organizations using Verysync 2.21.3 should consider this vulnerability a significant risk to confidentiality and implement compensating controls until a patch is released.
Potential Impact
For European organizations, the primary impact is unauthorized disclosure of potentially sensitive information managed by the Verysync Web Administration Module. This could include configuration details, client report data, or other internal information that could aid further attacks or expose confidential business data. The vulnerability's remote exploitability without authentication means attackers can target exposed Verysync instances over the internet or internal networks. This increases the risk of data breaches, compliance violations (e.g., GDPR), and reputational damage. Organizations in sectors with strict data protection requirements, such as finance, healthcare, and government, are particularly vulnerable. The lack of vendor response and patch availability prolongs exposure, necessitating immediate mitigation. The exploit's public availability raises the likelihood of opportunistic attacks, especially from cybercriminals scanning for vulnerable instances. Overall, the vulnerability threatens confidentiality but does not directly affect system integrity or availability.
Mitigation Recommendations
1. Immediately restrict network access to the Verysync Web Administration Module, especially the /safebrowsing/clientreport/download endpoint, using firewalls or network segmentation to limit exposure to trusted IPs only. 2. Monitor network traffic and logs for unusual or repeated access attempts to the vulnerable endpoint, employing intrusion detection systems (IDS) or web application firewalls (WAF) with custom rules targeting the exploit patterns. 3. Disable or restrict the safebrowsing/clientreport/download functionality if feasible until a patch is available. 4. Conduct an internal audit to identify all Verysync 2.21.3 instances and assess exposure risk. 5. Engage with the vendor for updates and subscribe to vulnerability advisories to apply patches promptly once released. 6. Consider deploying application-layer proxies or reverse proxies that can filter or sanitize requests to the vulnerable endpoint. 7. Educate IT and security teams about this vulnerability and the importance of rapid response to information disclosure threats. 8. If sensitive data leakage is suspected, perform a forensic investigation and notify affected stakeholders as per regulatory requirements.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-14198: Information Disclosure
Description
A vulnerability was detected in Verysync 微力同步 2.21.3. This affects an unknown function of the file /safebrowsing/clientreport/download?key=dummytoken of the component Web Administration Module. Performing manipulation results in information disclosure. The attack is possible to be carried out remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-14198 is a medium-severity information disclosure vulnerability affecting Verysync 微力同步 version 2.21.3. The vulnerability resides in an unspecified function within the Web Administration Module, specifically the /safebrowsing/clientreport/download endpoint, which accepts a 'key' parameter (demonstrated with 'dummytoken'). By manipulating requests to this endpoint remotely, an attacker can cause the system to leak sensitive information. The vulnerability requires no authentication, user interaction, or privileges, making it remotely exploitable over the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P) indicates low complexity and no required privileges or user interaction, with partial confidentiality impact but no integrity or availability impact. Although the vendor was notified early, they have not responded or issued a patch, and exploit code is publicly available, increasing the risk of exploitation. The exact nature of the leaked information is unspecified, but given the module's role in web administration and safebrowsing reporting, it could include sensitive configuration or usage data. No known active exploitation has been reported yet, but the public availability of exploits elevates the threat level. Organizations using Verysync 2.21.3 should consider this vulnerability a significant risk to confidentiality and implement compensating controls until a patch is released.
Potential Impact
For European organizations, the primary impact is unauthorized disclosure of potentially sensitive information managed by the Verysync Web Administration Module. This could include configuration details, client report data, or other internal information that could aid further attacks or expose confidential business data. The vulnerability's remote exploitability without authentication means attackers can target exposed Verysync instances over the internet or internal networks. This increases the risk of data breaches, compliance violations (e.g., GDPR), and reputational damage. Organizations in sectors with strict data protection requirements, such as finance, healthcare, and government, are particularly vulnerable. The lack of vendor response and patch availability prolongs exposure, necessitating immediate mitigation. The exploit's public availability raises the likelihood of opportunistic attacks, especially from cybercriminals scanning for vulnerable instances. Overall, the vulnerability threatens confidentiality but does not directly affect system integrity or availability.
Mitigation Recommendations
1. Immediately restrict network access to the Verysync Web Administration Module, especially the /safebrowsing/clientreport/download endpoint, using firewalls or network segmentation to limit exposure to trusted IPs only. 2. Monitor network traffic and logs for unusual or repeated access attempts to the vulnerable endpoint, employing intrusion detection systems (IDS) or web application firewalls (WAF) with custom rules targeting the exploit patterns. 3. Disable or restrict the safebrowsing/clientreport/download functionality if feasible until a patch is available. 4. Conduct an internal audit to identify all Verysync 2.21.3 instances and assess exposure risk. 5. Engage with the vendor for updates and subscribe to vulnerability advisories to apply patches promptly once released. 6. Consider deploying application-layer proxies or reverse proxies that can filter or sanitize requests to the vulnerable endpoint. 7. Educate IT and security teams about this vulnerability and the importance of rapid response to information disclosure threats. 8. If sensitive data leakage is suspected, perform a forensic investigation and notify affected stakeholders as per regulatory requirements.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-06T17:34:31.891Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6935adb1551a24bb8cca33db
Added to database: 12/7/2025, 4:39:13 PM
Last enriched: 12/14/2025, 4:55:03 PM
Last updated: 2/7/2026, 1:15:18 PM
Views: 110
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Organizations Urged to Replace Discontinued Edge Devices
MediumCVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.