Skip to main content

CVE-2025-54834: CWE-204 Observable Response Discrepancy in OPEXUS FOIAXpress Public Access Link (PAL)

Medium
VulnerabilityCVE-2025-54834cvecve-2025-54834cwe-204
Published: Thu Jul 31 2025 (07/31/2025, 17:26:04 UTC)
Source: CVE Database V5
Vendor/Project: OPEXUS
Product: FOIAXpress Public Access Link (PAL)

Description

OPEXUS FOIAXpress Public Access Link (PAL) version v11.1.0 allows an unauthenticated, remote attacker to query the /App/CreateRequest.aspx endpoint to check for the existence of valid usernames. There are no rate-limiting mechanisms in place.

AI-Powered Analysis

AILast updated: 07/31/2025, 18:02:43 UTC

Technical Analysis

CVE-2025-54834 is a medium-severity vulnerability affecting OPEXUS FOIAXpress Public Access Link (PAL) version 11.1.0. The vulnerability arises from an observable response discrepancy at the /App/CreateRequest.aspx endpoint, which allows an unauthenticated remote attacker to enumerate valid usernames. Specifically, the endpoint responds differently depending on whether the submitted username exists or not, enabling attackers to confirm valid user accounts without authentication. Furthermore, the system lacks any rate-limiting mechanisms, allowing attackers to perform automated, high-volume username enumeration attacks without restriction. This vulnerability is classified under CWE-204 (Observable Response Discrepancy), which typically leads to information disclosure that can facilitate further attacks such as credential stuffing, phishing, or targeted brute-force attacks. The CVSS 3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based, requires no privileges or user interaction, and impacts confidentiality by disclosing valid usernames, but does not affect integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. However, the presence of this vulnerability in a public-facing government or organizational FOIA (Freedom of Information Act) request system could be leveraged by attackers to gather intelligence on user accounts, potentially aiding subsequent attacks against those users or the system itself.

Potential Impact

For European organizations, especially governmental bodies, public institutions, or any entities using OPEXUS FOIAXpress PAL for managing public information requests, this vulnerability poses a significant privacy and security risk. The ability to enumerate valid usernames can lead to targeted phishing campaigns, social engineering, or brute-force password attacks against confirmed accounts. Given that FOIAXpress is often used by public sector organizations to handle sensitive information requests, the exposure of valid user accounts could undermine trust and lead to unauthorized access attempts. While the vulnerability does not directly compromise data integrity or availability, the information disclosure can serve as a stepping stone for more severe attacks. European organizations are also subject to strict data protection regulations such as GDPR, and failure to protect user information—even usernames—could result in regulatory scrutiny and penalties. Additionally, the lack of rate limiting exacerbates the risk by enabling attackers to perform large-scale automated attacks without detection or throttling.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement several specific measures: 1) Apply patches or updates from OPEXUS as soon as they become available to address the username enumeration flaw. 2) Implement server-side rate limiting on the /App/CreateRequest.aspx endpoint to restrict the number of requests from a single IP address or user agent within a given timeframe, thereby reducing the feasibility of automated enumeration attacks. 3) Modify the application logic to standardize responses regardless of username validity, ensuring that the endpoint returns identical status codes and messages whether or not a username exists, thus eliminating observable response discrepancies. 4) Employ web application firewalls (WAFs) with rules designed to detect and block suspicious enumeration patterns targeting this endpoint. 5) Monitor logs for unusual access patterns or spikes in requests to the vulnerable endpoint to enable early detection of exploitation attempts. 6) Educate users and administrators about the risks of username enumeration and encourage strong, unique passwords combined with multi-factor authentication (MFA) where possible to reduce the impact of compromised credentials. 7) Conduct regular security assessments and penetration testing focused on authentication and information disclosure vectors to proactively identify and remediate similar issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2025-07-30T14:04:30.745Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 688bac43ad5a09ad00bb3553

Added to database: 7/31/2025, 5:47:47 PM

Last enriched: 7/31/2025, 6:02:43 PM

Last updated: 8/1/2025, 10:44:45 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats