CVE-2025-60914: n/a
Incorrect access control in Austrian Archaeological Institute Openatlas before v8.12.0 allows attackers to access sensitive information via sending a crafted GET request to the /display_logo endpoint.
AI Analysis
Technical Summary
CVE-2025-60914 is an access control vulnerability identified in the Openatlas software developed by the Austrian Archaeological Institute, affecting versions prior to 8.12.0. The flaw resides in the /display_logo endpoint, which improperly restricts access, allowing attackers to retrieve sensitive information by crafting specific GET requests. The vulnerability is classified under CWE-79, indicating a cross-site scripting (XSS) related weakness, but here it primarily manifests as an access control issue. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N) indicates that the attack can be performed remotely over the network with low attack complexity, requires privileges (likely a low-level user), and user interaction is necessary. The scope remains unchanged, affecting confidentiality and integrity to a limited extent, but not availability. Although no public exploits are currently known, the vulnerability could be leveraged by attackers to gain unauthorized access to sensitive data, potentially leading to information disclosure or further exploitation. The lack of a patch link suggests that remediation involves upgrading to version 8.12.0 or applying vendor-provided fixes once available. Given the specialized nature of Openatlas, the vulnerability primarily threatens institutions using this software for archaeological data management.
Potential Impact
For European organizations, particularly cultural heritage, archaeological research institutions, and academic entities using Openatlas, this vulnerability poses a risk of unauthorized disclosure of sensitive archaeological data. Such information could include site locations, research findings, or proprietary data, potentially compromising research integrity and confidentiality. The impact is more pronounced in Austria, where the software originates and is likely widely used, but also extends to other European countries with active archaeological research communities. While the vulnerability does not affect system availability, the exposure of sensitive data could lead to reputational damage, loss of intellectual property, and potential misuse of archaeological site information. Additionally, attackers exploiting this flaw might leverage the information gained to mount further attacks or social engineering campaigns. The requirement for some privileges and user interaction limits the attack surface but does not eliminate risk, especially in environments with multiple users and remote access capabilities.
Mitigation Recommendations
Organizations should immediately verify their Openatlas software version and upgrade to version 8.12.0 or later where the vulnerability is addressed. Until the upgrade is applied, restrict access to the /display_logo endpoint through network segmentation, firewall rules, or web application firewalls to limit exposure. Implement strict access controls and monitor logs for unusual GET requests targeting this endpoint. Educate users about the risk of interacting with suspicious links or requests that could trigger the vulnerability. Conduct regular audits of user privileges to ensure minimal necessary access is granted, reducing the potential for exploitation. Additionally, coordinate with the software vendor or Austrian Archaeological Institute for official patches or mitigation guidance. Employ intrusion detection systems to detect anomalous behavior related to this endpoint. Finally, maintain updated backups and incident response plans tailored to data confidentiality breaches.
Affected Countries
Austria, Germany, Italy, France, Switzerland, Belgium, Netherlands, United Kingdom
CVE-2025-60914: n/a
Description
Incorrect access control in Austrian Archaeological Institute Openatlas before v8.12.0 allows attackers to access sensitive information via sending a crafted GET request to the /display_logo endpoint.
AI-Powered Analysis
Technical Analysis
CVE-2025-60914 is an access control vulnerability identified in the Openatlas software developed by the Austrian Archaeological Institute, affecting versions prior to 8.12.0. The flaw resides in the /display_logo endpoint, which improperly restricts access, allowing attackers to retrieve sensitive information by crafting specific GET requests. The vulnerability is classified under CWE-79, indicating a cross-site scripting (XSS) related weakness, but here it primarily manifests as an access control issue. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N) indicates that the attack can be performed remotely over the network with low attack complexity, requires privileges (likely a low-level user), and user interaction is necessary. The scope remains unchanged, affecting confidentiality and integrity to a limited extent, but not availability. Although no public exploits are currently known, the vulnerability could be leveraged by attackers to gain unauthorized access to sensitive data, potentially leading to information disclosure or further exploitation. The lack of a patch link suggests that remediation involves upgrading to version 8.12.0 or applying vendor-provided fixes once available. Given the specialized nature of Openatlas, the vulnerability primarily threatens institutions using this software for archaeological data management.
Potential Impact
For European organizations, particularly cultural heritage, archaeological research institutions, and academic entities using Openatlas, this vulnerability poses a risk of unauthorized disclosure of sensitive archaeological data. Such information could include site locations, research findings, or proprietary data, potentially compromising research integrity and confidentiality. The impact is more pronounced in Austria, where the software originates and is likely widely used, but also extends to other European countries with active archaeological research communities. While the vulnerability does not affect system availability, the exposure of sensitive data could lead to reputational damage, loss of intellectual property, and potential misuse of archaeological site information. Additionally, attackers exploiting this flaw might leverage the information gained to mount further attacks or social engineering campaigns. The requirement for some privileges and user interaction limits the attack surface but does not eliminate risk, especially in environments with multiple users and remote access capabilities.
Mitigation Recommendations
Organizations should immediately verify their Openatlas software version and upgrade to version 8.12.0 or later where the vulnerability is addressed. Until the upgrade is applied, restrict access to the /display_logo endpoint through network segmentation, firewall rules, or web application firewalls to limit exposure. Implement strict access controls and monitor logs for unusual GET requests targeting this endpoint. Educate users about the risk of interacting with suspicious links or requests that could trigger the vulnerability. Conduct regular audits of user privileges to ensure minimal necessary access is granted, reducing the potential for exploitation. Additionally, coordinate with the software vendor or Austrian Archaeological Institute for official patches or mitigation guidance. Employ intrusion detection systems to detect anomalous behavior related to this endpoint. Finally, maintain updated backups and incident response plans tailored to data confidentiality breaches.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-26T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6924792eefc7406fa6649b59
Added to database: 11/24/2025, 3:26:38 PM
Last enriched: 12/1/2025, 3:46:18 PM
Last updated: 1/8/2026, 8:10:24 PM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0747: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Devolutions Remote Desktop Manager
UnknownCVE-2025-65731: n/a
HighCVE-2025-68715: n/a
HighCVE-2025-66916: n/a
HighCVE-2025-66913: n/a
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.