Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67805: n/a

0
Medium
VulnerabilityCVE-2025-67805cvecve-2025-67805
Published: Wed Apr 01 2026 (04/01/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A non-default configuration in Sage DPW 2025_06_004 allows unauthenticated access to diagnostic endpoints within the Database Monitor feature, exposing sensitive information such as hashes and table names. This feature is disabled by default in all installations and never available in Sage DPW Cloud. It was forcibly disabled again in version 2025_06_003.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 15:40:44 UTC

Technical Analysis

CVE-2025-67805 is a vulnerability identified in the Sage DPW software prior to version 2025_06_003, specifically related to a non-default configuration of the Database Monitor feature. When enabled, this feature exposes diagnostic endpoints that can be accessed without authentication. These endpoints reveal sensitive internal information, including password hashes and database table names, which could be leveraged by attackers to gain deeper insight into the system's structure and potentially facilitate further attacks such as credential cracking or targeted database exploitation. The vulnerability does not affect the default installation since the feature is disabled by default and is also not present in Sage DPW Cloud environments. The vendor addressed the issue by forcibly disabling the feature again in version 2025_06_003, effectively mitigating the vulnerability in newer releases. The CVSS 3.1 score of 5.9 reflects a medium severity, with the attack vector being network-based, no privileges or user interaction required, and a high impact on confidentiality but no impact on integrity or availability. No public exploits have been reported, indicating limited active exploitation at this time. However, the exposure of sensitive data such as hashes could enable offline attacks or assist attackers in lateral movement within compromised environments.

Potential Impact

The primary impact of CVE-2025-67805 is the unauthorized disclosure of sensitive information, including password hashes and database schema details. This exposure can compromise confidentiality and potentially aid attackers in escalating privileges or conducting further attacks such as password cracking or SQL injection. Organizations running affected versions of Sage DPW with the vulnerable configuration enabled face increased risk of data breaches and unauthorized access. While the vulnerability does not directly affect system integrity or availability, the leaked information can be a stepping stone for more severe attacks. The fact that the feature is disabled by default and not present in cloud deployments limits the overall exposure, but organizations that have enabled the diagnostic endpoints for troubleshooting or monitoring purposes are particularly vulnerable. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially if attackers discover this vulnerability independently.

Mitigation Recommendations

Organizations should verify whether the Database Monitor diagnostic endpoints are enabled in their Sage DPW installations. If enabled, immediate action should be taken to disable these endpoints to prevent unauthenticated access. Upgrading to Sage DPW version 2025_06_003 or later is strongly recommended, as the vendor has forcibly disabled the vulnerable feature in these versions. Additionally, organizations should audit access logs for any suspicious activity related to these endpoints and monitor for attempts to access diagnostic URLs. Implementing network-level controls such as firewall rules to restrict access to management or diagnostic interfaces can further reduce exposure. Where possible, sensitive information such as password hashes should be stored using strong hashing algorithms with salts to mitigate the impact of any potential leaks. Regular security assessments and configuration reviews should be conducted to ensure that non-default features do not inadvertently expose sensitive data.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cd3867e6bfc5ba1ddc2e34

Added to database: 4/1/2026, 3:23:19 PM

Last enriched: 4/1/2026, 3:40:44 PM

Last updated: 4/6/2026, 8:29:48 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses