Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60949: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Census CSWeb

0
Critical
VulnerabilityCVE-2025-60949cvecve-2025-60949cwe-200
Published: Mon Mar 23 2026 (03/23/2026, 21:00:55 UTC)
Source: CVE Database V5
Vendor/Project: Census
Product: CSWeb

Description

CVE-2025-60949 is a critical vulnerability in Census CSWeb version 8. 0. 1 where the 'app/config' directory is accessible via HTTP without authentication. This misconfiguration allows remote attackers to retrieve sensitive configuration files containing secrets, leading to exposure of confidential information. The vulnerability requires no user interaction or privileges and has a CVSS 4. 0 score of 9. 3, indicating high impact on confidentiality and integrity. The issue is fixed in version 8. 1. 0 alpha.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 00:12:00 UTC

Technical Analysis

CVE-2025-60949 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting Census CSWeb version 8.0.1. The root cause is that the 'app/config' directory is accessible over HTTP in some deployments, allowing unauthenticated remote attackers to directly request and retrieve configuration files. These files often contain sensitive secrets such as database credentials, API keys, or other confidential configuration data. Because the vulnerability requires no authentication, no user interaction, and can be exploited remotely, it poses a significant risk. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N) reflects that the attack vector is network-based, with low attack complexity, no privileges or user interaction needed, and high impact on confidentiality and integrity. The vulnerability was publicly disclosed on March 23, 2026, and fixed in the 8.1.0 alpha release of Census CSWeb. Although no exploits are known in the wild, the ease of exploitation and the nature of leaked data make this a critical security issue. Organizations running the vulnerable version should prioritize upgrading and apply access controls to prevent unauthorized HTTP access to sensitive directories.

Potential Impact

The exposure of configuration files containing sensitive secrets can have severe consequences for organizations worldwide. Attackers gaining access to database credentials or API keys can escalate attacks, leading to data breaches, unauthorized data manipulation, or lateral movement within networks. Confidentiality is severely compromised, and integrity may also be affected if attackers use leaked credentials to alter data or system configurations. The availability impact is minimal but could arise indirectly if attackers leverage the information to disrupt services. Because the vulnerability requires no authentication and no user interaction, it can be exploited at scale, increasing the risk of widespread compromise. Organizations relying on Census CSWeb 8.0.1 in critical infrastructure, government, or enterprise environments face heightened risks of data leakage and subsequent cyberattacks.

Mitigation Recommendations

1. Upgrade Census CSWeb to version 8.1.0 or later where the vulnerability is fixed. 2. Immediately restrict HTTP access to the 'app/config' directory using web server configuration rules (e.g., deny all access or require authentication). 3. Implement network-level controls such as firewalls or reverse proxies to block unauthorized external access to sensitive paths. 4. Conduct an audit of all configuration files to identify and rotate any leaked secrets or credentials. 5. Employ web application firewalls (WAFs) with rules to detect and block attempts to access configuration files. 6. Review deployment practices to ensure sensitive files are never exposed via HTTP or other public interfaces. 7. Monitor logs for suspicious requests targeting configuration paths to detect exploitation attempts early. 8. Educate development and operations teams on secure configuration management and the risks of exposing sensitive files.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisa-cg
Date Reserved
2025-09-26T05:34:11.056Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c1d4aef4197a8e3ba0b57d

Added to database: 3/24/2026, 12:02:54 AM

Last enriched: 3/24/2026, 12:12:00 AM

Last updated: 3/24/2026, 6:52:53 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses