Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66910: n/a

0
Medium
VulnerabilityCVE-2025-66910cvecve-2025-66910
Published: Fri Dec 19 2025 (12/19/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-66910 is a vulnerability in Turms Server v0. 10. 0-SNAPSHOT and earlier where administrator passwords are stored in plaintext in memory after successful login. This occurs because the BaseAdminService class caches raw passwords unencrypted within AdminInfo objects to optimize authentication performance. Attackers with local system access can extract these passwords via memory dumps, heap analysis, or debugger attachment, bypassing bcrypt protections. The vulnerability has a CVSS score of 6. 0, indicating medium severity, with high impact on confidentiality and integrity but no impact on availability. Exploitation requires local privileges and no user interaction. There are no known exploits in the wild or patches currently available. European organizations using Turms Server should be aware of the risk of credential exposure if attackers gain local access.

AI-Powered Analysis

AILast updated: 12/26/2025, 15:21:53 UTC

Technical Analysis

CVE-2025-66910 identifies a security vulnerability in the Turms Server software, specifically versions v0.10.0-SNAPSHOT and earlier. The vulnerability arises from the BaseAdminService class caching administrator passwords in plaintext within AdminInfo objects to optimize authentication performance. After an administrator successfully logs in, their raw password is stored unencrypted in memory in a field named rawPassword. This practice circumvents the security benefits of bcrypt hashing, as the plaintext password remains accessible in memory. An attacker with local system access—such as through a compromised account or privilege escalation—can extract these plaintext passwords by performing memory dumps, analyzing the heap, or attaching a debugger to the running process. This exposure compromises the confidentiality and integrity of administrator credentials, potentially allowing further unauthorized access or privilege escalation. The CVSS v3.1 score is 6.0 (medium severity), reflecting that exploitation requires local access and privileges but can lead to significant credential compromise. No known exploits have been reported in the wild, and no patches are currently available. The vulnerability is categorized under CWE-256 (Plaintext Storage of a Password) and CWE-532 (Insertion of Sensitive Information into Log File), highlighting improper handling of sensitive data. Organizations relying on Turms Server should prioritize mitigating this risk to prevent credential theft and subsequent attacks.

Potential Impact

For European organizations, the primary impact of CVE-2025-66910 is the potential compromise of administrator credentials if an attacker gains local access to systems running vulnerable Turms Server versions. This can lead to unauthorized administrative control, data breaches, and further lateral movement within networks. Confidentiality is severely impacted as plaintext passwords can be extracted, and integrity is at risk due to possible unauthorized changes by attackers using stolen credentials. Availability is not directly affected. Organizations in sectors with high-value data or critical infrastructure using Turms Server could face significant operational and reputational damage. The requirement for local access limits remote exploitation but increases risk from insider threats or attackers who have already breached perimeter defenses. Given the lack of patches, the vulnerability poses a persistent risk until addressed. European entities with strict data protection regulations (e.g., GDPR) must consider the legal and compliance implications of credential exposure incidents.

Mitigation Recommendations

1. Restrict local system access strictly to trusted administrators and monitor for unauthorized access attempts. 2. Employ endpoint detection and response (EDR) tools to detect suspicious memory access or debugging activities. 3. Implement strict privilege separation and minimize the number of users with local administrative rights on servers running Turms. 4. Use memory protection techniques such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) to complicate memory analysis. 5. Regularly audit and monitor authentication logs for anomalies indicating potential credential compromise. 6. Engage with Turms Server developers or vendors to request patches or updates that eliminate plaintext password caching. 7. Consider deploying application-level encryption or secure enclave technologies to protect sensitive data in memory. 8. Conduct internal security training to raise awareness about the risks of local access and memory extraction techniques. 9. If possible, isolate Turms Server instances in hardened environments with limited access and network segmentation. 10. Prepare incident response plans specifically addressing credential theft scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69456762a90e3c9a1540c4ae

Added to database: 12/19/2025, 2:55:30 PM

Last enriched: 12/26/2025, 3:21:53 PM

Last updated: 2/7/2026, 7:00:06 AM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats