Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62586: CWE-306 Missing Authentication for Critical Function in OPEXUS FOIAXpress

0
High
VulnerabilityCVE-2025-62586cvecve-2025-62586cwe-306
Published: Thu Oct 16 2025 (10/16/2025, 17:20:09 UTC)
Source: CVE Database V5
Vendor/Project: OPEXUS
Product: FOIAXpress

Description

OPEXUS FOIAXpress allows a remote, unauthenticated attacker to reset the administrator password. Fixed in FOIAXpress version 11.13.2.0.

AI-Powered Analysis

AILast updated: 10/16/2025, 17:58:55 UTC

Technical Analysis

CVE-2025-62586 is a critical security vulnerability identified in OPEXUS FOIAXpress version 11.1.0, categorized under CWE-306 (Missing Authentication for Critical Function). The vulnerability allows a remote attacker to reset the administrator password without any authentication or user interaction, effectively bypassing all access controls. This is due to a missing authentication check on a critical function responsible for password resets. The attack vector is network-based (AV:N), requiring no privileges (PR:N), no user interaction (UI:N), and no scope change (S:N). The vulnerability impacts confidentiality, integrity, and availability at a high level (VC:H, VI:H, VA:H). The CVSS 4.0 base score is 8.9, indicating a high-severity issue. The flaw was publicly disclosed on October 16, 2025, and fixed in FOIAXpress version 11.13.2.0. No known exploits have been reported in the wild yet, but the vulnerability’s characteristics make it highly exploitable. FOIAXpress is widely used by government agencies and organizations handling Freedom of Information Act (FOIA) requests, making this vulnerability particularly sensitive due to the nature of the data processed. Attackers exploiting this vulnerability could gain full administrative access, leading to unauthorized data disclosure, data manipulation, or service disruption.

Potential Impact

For European organizations, especially government agencies and public institutions that use FOIAXpress for managing information requests, this vulnerability poses a significant threat. Exploitation could lead to unauthorized administrative access, allowing attackers to reset passwords, access sensitive information, alter or delete records, and disrupt service availability. This could result in breaches of personal data protected under GDPR, damage to organizational reputation, legal liabilities, and operational downtime. The ability to reset administrator credentials remotely without authentication increases the risk of widespread compromise if the vulnerable version is exposed to untrusted networks. The impact is amplified in countries with stringent data protection regulations and high reliance on FOIAXpress for transparency and information governance.

Mitigation Recommendations

1. Immediately upgrade all FOIAXpress installations to version 11.13.2.0 or later, where the vulnerability is patched. 2. Restrict network access to FOIAXpress administrative interfaces using firewalls or VPNs to limit exposure to trusted internal networks only. 3. Implement strong network segmentation to isolate FOIAXpress servers from general user networks and the internet. 4. Monitor logs for unusual password reset attempts or administrative actions to detect potential exploitation attempts. 5. Employ multi-factor authentication (MFA) on administrative accounts where supported, adding an additional layer of security. 6. Conduct regular vulnerability scans and penetration tests focusing on FOIAXpress deployments to ensure no residual vulnerabilities remain. 7. Educate IT and security teams about this specific vulnerability and the importance of timely patching and access control enforcement.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2025-10-16T16:16:49.618Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f12ee39f8a5dbaeaee6025

Added to database: 10/16/2025, 5:44:03 PM

Last enriched: 10/16/2025, 5:58:55 PM

Last updated: 10/19/2025, 12:10:03 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats