Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2775: CWE-611 Improper Restriction of XML External Entity Reference in SysAid SysAid On-Prem

0
Critical
VulnerabilityCVE-2025-2775cvecve-2025-2775cwe-611
Published: Wed May 07 2025 (05/07/2025, 14:43:23 UTC)
Source: CVE
Vendor/Project: SysAid
Product: SysAid On-Prem

Description

SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the Checkin processing functionality, allowing for administrator account takeover and file read primitives.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 12:59:39 UTC

Technical Analysis

CVE-2025-2775 is an XML External Entity (XXE) vulnerability classified under CWE-611, affecting SysAid On-Prem versions up to 23.3.40. The vulnerability resides in the Checkin processing functionality, which improperly restricts XML external entity references. This flaw allows an unauthenticated attacker to craft malicious XML payloads that, when processed by the vulnerable system, can lead to disclosure of sensitive files on the server and unauthorized administrative account takeover. The attack vector is network-based, requiring no authentication or user interaction, which significantly lowers the barrier to exploitation. The vulnerability impacts confidentiality by exposing sensitive data and integrity by enabling administrative control takeover, although availability impact is low. The CVSS 3.1 score of 9.3 reflects these factors, emphasizing the critical nature of the vulnerability. No patches or public exploits are currently reported, but the presence of such a vulnerability in IT service management software poses a high risk to organizations relying on SysAid for internal operations. The vulnerability’s exploitation could facilitate lateral movement, data exfiltration, and persistent access within affected environments.

Potential Impact

The impact of CVE-2025-2775 is severe for organizations using SysAid On-Prem, especially those managing critical IT service operations. An attacker exploiting this vulnerability can gain unauthorized access to sensitive configuration files and credentials, leading to full administrative control over the SysAid platform. This can result in unauthorized changes to IT service management workflows, data theft, and potential disruption of IT support functions. The compromise of administrator accounts also increases the risk of further lateral movement within the network, potentially exposing other critical systems. Confidentiality is highly impacted due to file read capabilities, and integrity is compromised through administrator account takeover. Although availability impact is rated low, the operational disruption caused by administrative compromise can indirectly affect service availability. Organizations worldwide that depend on SysAid for ITSM are at risk of significant operational and reputational damage if this vulnerability is exploited.

Mitigation Recommendations

Immediate mitigation steps include disabling or restricting XML external entity processing in the SysAid On-Prem Checkin functionality if configurable. Network-level controls such as web application firewalls (WAFs) should be configured to detect and block malicious XML payloads containing external entity references. Monitoring and logging of XML processing errors and unusual administrative account activities should be enhanced to detect exploitation attempts early. Organizations should isolate SysAid servers from untrusted networks and restrict access to trusted administrators only. Until an official patch is released, consider deploying virtual patching techniques or application-layer filters to mitigate the vulnerability. Once a vendor patch becomes available, prioritize its deployment in all affected environments. Additionally, conduct a thorough audit of administrator accounts and system logs to identify any signs of compromise. Regular backups and incident response plans should be updated to address potential exploitation scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-03-24T21:52:43.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd8992

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 2/27/2026, 12:59:39 PM

Last updated: 3/24/2026, 9:19:30 PM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses