CVE-2025-24391: CWE-203 Observable Discrepancy in OTRS AG OTRS
A vulnerability in the External Interface of OTRS allows conclusions to be drawn about the existence of user accounts through different HTTP response codes and messages. This enables an attacker to systematically identify valid email addresses. This issue affects: * OTRS 7.0.X * OTRS 8.0.X * OTRS 2023.X * OTRS 2024.X * OTRS 2025.X
AI Analysis
Technical Summary
CVE-2025-24391 is a medium-severity vulnerability affecting multiple versions of the OTRS ticketing and service management software, specifically versions 7.0.x, 8.0.x, 2023.x, 2024.x, and 2025.x. The vulnerability arises from an observable discrepancy in the External Interface of OTRS, where different HTTP response codes and messages are returned based on whether a user account exists or not. This behavior enables an attacker to perform user enumeration attacks by systematically probing the interface with various email addresses and analyzing the server's responses to infer valid accounts. The vulnerability is classified under CWE-203 (Observable Discrepancy), indicating that the system leaks information through inconsistent responses. The CVSS v3.1 base score is 5.3, reflecting a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to confidentiality (C:L) without affecting integrity or availability. No known exploits are reported in the wild as of the publication date (July 14, 2025), and no patches have been linked yet. This vulnerability primarily compromises confidentiality by allowing attackers to enumerate valid user email addresses, which can be leveraged for targeted phishing, social engineering, or further attacks against identified users.
Potential Impact
For European organizations using OTRS versions affected by this vulnerability, the primary impact is the exposure of valid user email addresses through user enumeration. This can facilitate targeted phishing campaigns, spear-phishing, and social engineering attacks, increasing the risk of credential compromise or unauthorized access. While the vulnerability does not directly allow system compromise or data manipulation, the leakage of user existence information undermines privacy and can be a stepping stone for more severe attacks. Organizations in sectors with sensitive customer or employee data, such as finance, healthcare, and government, are particularly at risk. The medium severity rating suggests that while the vulnerability is not critical, it still poses a meaningful threat to confidentiality and should be addressed promptly to reduce the attack surface and protect user information.
Mitigation Recommendations
To mitigate CVE-2025-24391, organizations should implement the following specific measures: 1) Apply any official patches or updates released by OTRS AG as soon as they become available to address the discrepancy in HTTP responses. 2) If patches are not yet available, configure the external interface to standardize HTTP response codes and messages for both valid and invalid user queries, thereby eliminating observable differences that enable enumeration. 3) Implement rate limiting and anomaly detection on the external interface to detect and block automated enumeration attempts. 4) Employ web application firewalls (WAFs) with custom rules to identify and mitigate suspicious probing behavior targeting user enumeration. 5) Educate users and administrators about the risks of phishing and social engineering, emphasizing vigilance against suspicious emails that may result from leaked user information. 6) Regularly audit logs for unusual access patterns or repeated failed attempts to enumerate users. These steps go beyond generic advice by focusing on response standardization, proactive detection, and user awareness tailored to this specific vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Belgium, Switzerland, Austria
CVE-2025-24391: CWE-203 Observable Discrepancy in OTRS AG OTRS
Description
A vulnerability in the External Interface of OTRS allows conclusions to be drawn about the existence of user accounts through different HTTP response codes and messages. This enables an attacker to systematically identify valid email addresses. This issue affects: * OTRS 7.0.X * OTRS 8.0.X * OTRS 2023.X * OTRS 2024.X * OTRS 2025.X
AI-Powered Analysis
Technical Analysis
CVE-2025-24391 is a medium-severity vulnerability affecting multiple versions of the OTRS ticketing and service management software, specifically versions 7.0.x, 8.0.x, 2023.x, 2024.x, and 2025.x. The vulnerability arises from an observable discrepancy in the External Interface of OTRS, where different HTTP response codes and messages are returned based on whether a user account exists or not. This behavior enables an attacker to perform user enumeration attacks by systematically probing the interface with various email addresses and analyzing the server's responses to infer valid accounts. The vulnerability is classified under CWE-203 (Observable Discrepancy), indicating that the system leaks information through inconsistent responses. The CVSS v3.1 base score is 5.3, reflecting a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to confidentiality (C:L) without affecting integrity or availability. No known exploits are reported in the wild as of the publication date (July 14, 2025), and no patches have been linked yet. This vulnerability primarily compromises confidentiality by allowing attackers to enumerate valid user email addresses, which can be leveraged for targeted phishing, social engineering, or further attacks against identified users.
Potential Impact
For European organizations using OTRS versions affected by this vulnerability, the primary impact is the exposure of valid user email addresses through user enumeration. This can facilitate targeted phishing campaigns, spear-phishing, and social engineering attacks, increasing the risk of credential compromise or unauthorized access. While the vulnerability does not directly allow system compromise or data manipulation, the leakage of user existence information undermines privacy and can be a stepping stone for more severe attacks. Organizations in sectors with sensitive customer or employee data, such as finance, healthcare, and government, are particularly at risk. The medium severity rating suggests that while the vulnerability is not critical, it still poses a meaningful threat to confidentiality and should be addressed promptly to reduce the attack surface and protect user information.
Mitigation Recommendations
To mitigate CVE-2025-24391, organizations should implement the following specific measures: 1) Apply any official patches or updates released by OTRS AG as soon as they become available to address the discrepancy in HTTP responses. 2) If patches are not yet available, configure the external interface to standardize HTTP response codes and messages for both valid and invalid user queries, thereby eliminating observable differences that enable enumeration. 3) Implement rate limiting and anomaly detection on the external interface to detect and block automated enumeration attempts. 4) Employ web application firewalls (WAFs) with custom rules to identify and mitigate suspicious probing behavior targeting user enumeration. 5) Educate users and administrators about the risks of phishing and social engineering, emphasizing vigilance against suspicious emails that may result from leaked user information. 6) Regularly audit logs for unusual access patterns or repeated failed attempts to enumerate users. These steps go beyond generic advice by focusing on response standardization, proactive detection, and user awareness tailored to this specific vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- OTRS
- Date Reserved
- 2025-01-21T09:09:58.721Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6874c046a83201eaacc38abe
Added to database: 7/14/2025, 8:31:02 AM
Last enriched: 7/14/2025, 8:46:24 AM
Last updated: 7/18/2025, 8:33:17 PM
Views: 10
Related Threats
CVE-2025-6721: CWE-862 Missing Authorization in bandido MORKVA Vchasno Kasa Integration
MediumCVE-2025-6720: CWE-862 Missing Authorization in bandido MORKVA Vchasno Kasa Integration
MediumCVE-2025-29757: CWE-863 Incorrect Authorization in Growatt https://oss.growatt.com
CriticalCVE-2025-7697: CWE-502 Deserialization of Untrusted Data in crmperks Integration for Google Sheets and Contact Form 7, WPForms, Elementor, Ninja Forms
CriticalCVE-2025-7696: CWE-502 Deserialization of Untrusted Data in crmperks Integration for Pipedrive and Contact Form 7, WPForms, Elementor, Ninja Forms
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.