Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47222: n/a

0
Medium
VulnerabilityCVE-2025-47222cvecve-2025-47222
Published: Thu Nov 13 2025 (11/13/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A class name enumeration was found in Keyfactor SignServer versions prior to 7.3.2. Setting any chosen class name to any of the properties requiring a class path and the provided class is not expected to return different errors if the class exists in deployment or not. This returns information about the classes loaded in the application or not to the clientside.

AI-Powered Analysis

AILast updated: 12/17/2025, 20:07:47 UTC

Technical Analysis

CVE-2025-47222 is a vulnerability identified in Keyfactor SignServer versions prior to 7.3.2 involving class name enumeration. The issue arises because when a client supplies a class name to properties that require a class path, the server's error responses differ depending on whether the class exists in the deployed application or not. This discrepancy allows an unauthenticated remote attacker to enumerate the classes loaded within the application environment by analyzing the error messages returned. The vulnerability falls under CWE-284 (Improper Access Control), as the application inadvertently reveals internal implementation details that should remain confidential. The CVSS v3.1 base score is 6.5, reflecting a medium severity with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), no integrity impact (I:N), and low availability impact (A:L). Although the vulnerability does not allow direct code execution or data modification, the information disclosure can aid attackers in crafting targeted exploits or bypassing security controls by understanding the internal class structure. No patches or exploits are currently documented, but the issue is publicly known and should be addressed promptly.

Potential Impact

For European organizations, this vulnerability primarily poses a risk of information leakage that can facilitate further attacks. Keyfactor SignServer is used for certificate lifecycle management, digital signing, and cryptographic operations, often within critical infrastructure and regulated industries. Attackers leveraging class enumeration can gain insights into the server's internal architecture, potentially enabling them to identify vulnerable components or misconfigurations. This reconnaissance can lead to more sophisticated attacks such as privilege escalation, code injection, or bypassing security mechanisms. The availability impact is low but present, as malformed requests could potentially cause minor service disruptions. Confidentiality impact is limited to class presence information, but in sensitive environments, even this can be valuable. European entities relying on Keyfactor SignServer for secure certificate management, especially in finance, government, and telecommunications sectors, may face increased risk if this vulnerability is exploited as part of a multi-stage attack.

Mitigation Recommendations

European organizations should immediately verify their Keyfactor SignServer versions and upgrade to version 7.3.2 or later where this vulnerability is resolved. In the absence of an official patch, administrators should implement strict input validation and error handling to prevent differential error messages that reveal class existence. Network-level controls such as web application firewalls (WAFs) can be configured to detect and block suspicious requests attempting class path enumeration. Monitoring and logging should be enhanced to detect anomalous access patterns indicative of reconnaissance activities. Additionally, limiting exposure of the SignServer interface to trusted networks and enforcing strong authentication and authorization controls can reduce the attack surface. Regular security assessments and penetration testing focusing on error message handling and information disclosure should be conducted to identify similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-05-02T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691649d9819e592e58d3e48d

Added to database: 11/13/2025, 9:12:57 PM

Last enriched: 12/17/2025, 8:07:47 PM

Last updated: 12/30/2025, 11:34:25 AM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats