CVE-2025-47222: n/a
A class name enumeration was found in Keyfactor SignServer versions prior to 7.3.2. Setting any chosen class name to any of the properties requiring a class path and the provided class is not expected to return different errors if the class exists in deployment or not. This returns information about the classes loaded in the application or not to the clientside.
AI Analysis
Technical Summary
CVE-2025-47222 is a vulnerability identified in Keyfactor SignServer versions prior to 7.3.2 involving class name enumeration. The issue arises because when a client supplies a class name to properties that require a class path, the server's error responses differ depending on whether the class exists in the deployed application or not. This discrepancy allows an unauthenticated remote attacker to enumerate the classes loaded within the application environment by analyzing the error messages returned. The vulnerability falls under CWE-284 (Improper Access Control), as the application inadvertently reveals internal implementation details that should remain confidential. The CVSS v3.1 base score is 6.5, reflecting a medium severity with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), no integrity impact (I:N), and low availability impact (A:L). Although the vulnerability does not allow direct code execution or data modification, the information disclosure can aid attackers in crafting targeted exploits or bypassing security controls by understanding the internal class structure. No patches or exploits are currently documented, but the issue is publicly known and should be addressed promptly.
Potential Impact
For European organizations, this vulnerability primarily poses a risk of information leakage that can facilitate further attacks. Keyfactor SignServer is used for certificate lifecycle management, digital signing, and cryptographic operations, often within critical infrastructure and regulated industries. Attackers leveraging class enumeration can gain insights into the server's internal architecture, potentially enabling them to identify vulnerable components or misconfigurations. This reconnaissance can lead to more sophisticated attacks such as privilege escalation, code injection, or bypassing security mechanisms. The availability impact is low but present, as malformed requests could potentially cause minor service disruptions. Confidentiality impact is limited to class presence information, but in sensitive environments, even this can be valuable. European entities relying on Keyfactor SignServer for secure certificate management, especially in finance, government, and telecommunications sectors, may face increased risk if this vulnerability is exploited as part of a multi-stage attack.
Mitigation Recommendations
European organizations should immediately verify their Keyfactor SignServer versions and upgrade to version 7.3.2 or later where this vulnerability is resolved. In the absence of an official patch, administrators should implement strict input validation and error handling to prevent differential error messages that reveal class existence. Network-level controls such as web application firewalls (WAFs) can be configured to detect and block suspicious requests attempting class path enumeration. Monitoring and logging should be enhanced to detect anomalous access patterns indicative of reconnaissance activities. Additionally, limiting exposure of the SignServer interface to trusted networks and enforcing strong authentication and authorization controls can reduce the attack surface. Regular security assessments and penetration testing focusing on error message handling and information disclosure should be conducted to identify similar issues proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium
CVE-2025-47222: n/a
Description
A class name enumeration was found in Keyfactor SignServer versions prior to 7.3.2. Setting any chosen class name to any of the properties requiring a class path and the provided class is not expected to return different errors if the class exists in deployment or not. This returns information about the classes loaded in the application or not to the clientside.
AI-Powered Analysis
Technical Analysis
CVE-2025-47222 is a vulnerability identified in Keyfactor SignServer versions prior to 7.3.2 involving class name enumeration. The issue arises because when a client supplies a class name to properties that require a class path, the server's error responses differ depending on whether the class exists in the deployed application or not. This discrepancy allows an unauthenticated remote attacker to enumerate the classes loaded within the application environment by analyzing the error messages returned. The vulnerability falls under CWE-284 (Improper Access Control), as the application inadvertently reveals internal implementation details that should remain confidential. The CVSS v3.1 base score is 6.5, reflecting a medium severity with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), no integrity impact (I:N), and low availability impact (A:L). Although the vulnerability does not allow direct code execution or data modification, the information disclosure can aid attackers in crafting targeted exploits or bypassing security controls by understanding the internal class structure. No patches or exploits are currently documented, but the issue is publicly known and should be addressed promptly.
Potential Impact
For European organizations, this vulnerability primarily poses a risk of information leakage that can facilitate further attacks. Keyfactor SignServer is used for certificate lifecycle management, digital signing, and cryptographic operations, often within critical infrastructure and regulated industries. Attackers leveraging class enumeration can gain insights into the server's internal architecture, potentially enabling them to identify vulnerable components or misconfigurations. This reconnaissance can lead to more sophisticated attacks such as privilege escalation, code injection, or bypassing security mechanisms. The availability impact is low but present, as malformed requests could potentially cause minor service disruptions. Confidentiality impact is limited to class presence information, but in sensitive environments, even this can be valuable. European entities relying on Keyfactor SignServer for secure certificate management, especially in finance, government, and telecommunications sectors, may face increased risk if this vulnerability is exploited as part of a multi-stage attack.
Mitigation Recommendations
European organizations should immediately verify their Keyfactor SignServer versions and upgrade to version 7.3.2 or later where this vulnerability is resolved. In the absence of an official patch, administrators should implement strict input validation and error handling to prevent differential error messages that reveal class existence. Network-level controls such as web application firewalls (WAFs) can be configured to detect and block suspicious requests attempting class path enumeration. Monitoring and logging should be enhanced to detect anomalous access patterns indicative of reconnaissance activities. Additionally, limiting exposure of the SignServer interface to trusted networks and enforcing strong authentication and authorization controls can reduce the attack surface. Regular security assessments and penetration testing focusing on error message handling and information disclosure should be conducted to identify similar issues proactively.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-05-02T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 691649d9819e592e58d3e48d
Added to database: 11/13/2025, 9:12:57 PM
Last enriched: 12/17/2025, 8:07:47 PM
Last updated: 12/30/2025, 11:34:25 AM
Views: 51
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14509: CWE-94 Improper Control of Generation of Code ('Code Injection') in villatheme Lucky Wheel for WooCommerce – Spin a Sale
HighCVE-2025-15245: Path Traversal in D-Link DCS-850L
MediumCVE-2025-69093: Missing Authorization in wpdesk ShopMagic
UnknownCVE-2025-69092: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in WPDeveloper Essential Addons for Elementor
UnknownCVE-2025-69091: Missing Authorization in Kraft Plugins Demo Importer Plus
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.