Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2775: CWE-611 Improper Restriction of XML External Entity Reference in SysAid SysAid On-Prem

0
Critical
VulnerabilityCVE-2025-2775cvecve-2025-2775cwe-611
Published: Wed May 07 2025 (05/07/2025, 14:43:23 UTC)
Source: CVE
Vendor/Project: SysAid
Product: SysAid On-Prem

Description

SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the Checkin processing functionality, allowing for administrator account takeover and file read primitives.

AI-Powered Analysis

AILast updated: 11/19/2025, 15:36:04 UTC

Technical Analysis

CVE-2025-2775 is an XML External Entity (XXE) vulnerability classified under CWE-611 affecting SysAid On-Prem versions up to 23.3.40. The vulnerability resides in the Checkin processing functionality, which processes XML input without properly restricting external entity references. This improper restriction allows an unauthenticated attacker to craft malicious XML payloads that can be submitted remotely over the network. Exploiting this flaw enables the attacker to read arbitrary files on the server and escalate privileges to take over administrator accounts. The vulnerability's CVSS 3.1 score of 9.3 reflects its critical nature: it requires no authentication (PR:N), no user interaction (UI:N), and can be exploited remotely (AV:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. While no public exploits have been reported yet, the potential for severe impact on confidentiality and integrity is high. The lack of patches at the time of reporting necessitates immediate defensive measures. The vulnerability could be leveraged to compromise IT service management infrastructure, leading to disruption of enterprise operations and exposure of sensitive data.

Potential Impact

For European organizations, the impact of CVE-2025-2775 is significant due to the critical role SysAid On-Prem plays in IT service management and helpdesk operations. Successful exploitation can lead to full administrative control over the affected SysAid instance, enabling attackers to manipulate service tickets, access sensitive organizational data, and potentially pivot to other internal systems. Confidentiality is severely impacted as attackers can read arbitrary files, possibly including credentials or configuration files. Integrity is compromised through administrator account takeover, allowing unauthorized changes to system configurations and data. Availability impact is lower but still present due to potential disruption caused by unauthorized administrative actions. Organizations in sectors such as finance, healthcare, government, and critical infrastructure are particularly vulnerable due to the sensitive nature of their data and reliance on ITSM platforms. The vulnerability's unauthenticated remote exploitation capability increases the risk of widespread attacks if left unmitigated.

Mitigation Recommendations

1. Apply vendor patches immediately once available to address the XXE vulnerability in SysAid On-Prem. 2. Until patches are released, disable or restrict XML external entity processing in the Checkin functionality if configurable. 3. Implement network-level controls such as web application firewalls (WAFs) with rules to detect and block malicious XML payloads containing external entity references. 4. Restrict access to the SysAid On-Prem management interfaces to trusted internal networks and VPNs only, minimizing exposure to untrusted sources. 5. Monitor logs for unusual XML input patterns or failed authentication attempts indicative of exploitation attempts. 6. Conduct regular security assessments and penetration tests focusing on XML processing components. 7. Educate IT staff on the risks of XXE vulnerabilities and the importance of secure XML parsing configurations. 8. Isolate critical ITSM infrastructure from other network segments to limit lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-03-24T21:52:43.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd8992

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 11/19/2025, 3:36:04 PM

Last updated: 11/20/2025, 9:07:55 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats