Skip to main content

CVE-2025-51532: n/a

High
VulnerabilityCVE-2025-51532cvecve-2025-51532
Published: Wed Aug 06 2025 (08/06/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Incorrect access control in Sage DPW 2024_12_004 and earlier allows unauthorized attackers to access the built-in Database Monitor via a crafted request. The vendor has stated that the issue is fixed in 2025_06_000, released in June 2025.

AI-Powered Analysis

AILast updated: 08/14/2025, 00:55:36 UTC

Technical Analysis

CVE-2025-51532 is a high-severity vulnerability affecting Sage DPW versions 2024_12_004 and earlier. The flaw stems from incorrect access control mechanisms that allow unauthorized attackers to access the built-in Database Monitor component via a specially crafted request. This vulnerability does not require any authentication or user interaction, and can be exploited remotely over the network. The vulnerability is classified under CWE-284 (Improper Access Control), indicating that the system fails to properly restrict access to sensitive functionality. The Database Monitor likely contains sensitive information about the database state, performance, or configuration, and unauthorized access could lead to exposure of confidential data. The CVSS v3.1 base score is 7.5, reflecting high impact on confidentiality with no impact on integrity or availability. The vendor has addressed this issue in version 2025_06_000, released in June 2025. No known exploits are currently reported in the wild, but the vulnerability’s ease of exploitation and lack of required privileges make it a significant risk if unpatched. The vulnerability affects network-exposed services, increasing the attack surface and potential for exploitation by remote attackers.

Potential Impact

For European organizations using Sage DPW, this vulnerability poses a substantial risk to the confidentiality of their database information. Unauthorized access to the Database Monitor could expose sensitive business data, intellectual property, or personally identifiable information (PII), potentially violating GDPR and other data protection regulations. The exposure could lead to reputational damage, regulatory fines, and loss of customer trust. Given that Sage products are widely used in financial, manufacturing, and enterprise resource planning sectors across Europe, organizations in these industries are particularly at risk. The vulnerability’s remote exploitability without authentication means attackers can potentially compromise systems without insider access, increasing the likelihood of targeted or opportunistic attacks. Additionally, the lack of known exploits in the wild suggests a window of opportunity for attackers to develop and deploy exploits before organizations apply patches.

Mitigation Recommendations

European organizations should immediately verify their Sage DPW version and upgrade to version 2025_06_000 or later, where the vulnerability is fixed. If immediate patching is not feasible, organizations should restrict network access to the Database Monitor component by implementing strict firewall rules or network segmentation to limit exposure to trusted internal IP addresses only. Monitoring and logging access attempts to the Database Monitor should be enhanced to detect any unauthorized access attempts. Additionally, organizations should review and enforce least privilege principles for users and services interacting with Sage DPW. Conducting vulnerability scans and penetration tests focused on access control weaknesses in Sage DPW deployments can help identify residual risks. Finally, organizations should maintain up-to-date incident response plans to quickly address any potential exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6893f49cad5a09ad00f57e29

Added to database: 8/7/2025, 12:34:36 AM

Last enriched: 8/14/2025, 12:55:36 AM

Last updated: 8/14/2025, 12:55:36 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats