Skip to main content

CVE-2025-54832: CWE-472 External Control of Assumed-Immutable Web Parameter in OPEXUS FOIAXpress Public Access Link (PAL)

Medium
VulnerabilityCVE-2025-54832cvecve-2025-54832cwe-472
Published: Thu Jul 31 2025 (07/31/2025, 17:25:27 UTC)
Source: CVE Database V5
Vendor/Project: OPEXUS
Product: FOIAXpress Public Access Link (PAL)

Description

OPEXUS FOIAXpress Public Access Link (PAL), version v11.1.0, allows an authenticated user to add entries to the list of states and territories.

AI-Powered Analysis

AILast updated: 08/08/2025, 00:35:29 UTC

Technical Analysis

CVE-2025-54832 is a medium-severity vulnerability identified in OPEXUS FOIAXpress Public Access Link (PAL) version 11.1.0. The vulnerability is classified under CWE-472, which involves External Control of Assumed-Immutable Web Parameters. Specifically, this flaw allows an authenticated user to add entries to the list of states and territories within the application. This means that parameters or data fields that the system assumes to be immutable or controlled internally can be externally manipulated by users who have authentication privileges. Although the vulnerability does not directly impact confidentiality or availability, it affects the integrity of the application data by allowing unauthorized modification of state or territory entries. The CVSS 3.1 base score is 4.3, indicating a medium severity level, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N. This means the vulnerability can be exploited remotely over the network with low attack complexity, requires low privileges (authenticated user), no user interaction, and impacts only integrity without affecting confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability could potentially be leveraged to manipulate or corrupt data used for public access or reporting, possibly leading to misinformation or operational issues within organizations relying on FOIAXpress PAL for managing public information requests or geographic data.

Potential Impact

For European organizations using OPEXUS FOIAXpress PAL v11.1.0, this vulnerability could undermine the integrity of data related to states and territories, which may be critical for compliance, reporting, or public transparency obligations. Manipulated geographic or jurisdictional data could lead to incorrect processing of Freedom of Information (FOI) requests or misrepresentation of territorial information. While the vulnerability does not directly expose sensitive data or cause service outages, the integrity compromise could erode trust in public access systems and potentially cause administrative or legal complications. Organizations in sectors such as government, public administration, and legal services that rely on accurate FOI data could be particularly affected. The requirement for authenticated access limits exploitation to insiders or compromised accounts, but insider threats or credential theft could enable exploitation. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to prevent future abuse.

Mitigation Recommendations

European organizations should implement strict access controls and monitoring around FOIAXpress PAL user accounts to prevent unauthorized or malicious use of authenticated privileges. Regular audits of state and territory entries should be conducted to detect unauthorized modifications. Since no patch is currently available, organizations should consider implementing compensating controls such as input validation and parameter integrity checks at the application or network level, possibly through web application firewalls (WAFs) configured to detect anomalous parameter changes. User roles and permissions should be reviewed and minimized to the least privilege necessary. Additionally, organizations should monitor logs for unusual activity related to state or territory data changes and establish incident response procedures for suspected data integrity incidents. Engaging with OPEXUS for timely patch releases and updates is critical. Finally, educating users about the risks of credential compromise and enforcing strong authentication mechanisms (e.g., MFA) will reduce the risk of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2025-07-30T14:04:16.458Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 688bac43ad5a09ad00bb3549

Added to database: 7/31/2025, 5:47:47 PM

Last enriched: 8/8/2025, 12:35:29 AM

Last updated: 9/14/2025, 8:40:44 PM

Views: 47

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats