Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6967: CWE-698 Execution After Redirect (EAR) in Sarman Soft Software and Technology Services Industry and Trade Ltd. Co. CMS

0
High
VulnerabilityCVE-2025-6967cvecve-2025-6967cwe-698
Published: Tue Feb 10 2026 (02/10/2026, 13:43:37 UTC)
Source: CVE Database V5
Vendor/Project: Sarman Soft Software and Technology Services Industry and Trade Ltd. Co.
Product: CMS

Description

Execution After Redirect (EAR) vulnerability in Sarman Soft Software and Technology Services Industry and Trade Ltd. Co. CMS allows JSON Hijacking (aka JavaScript Hijacking), Authentication Bypass.This issue affects CMS: through 10022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 02/10/2026, 14:30:42 UTC

Technical Analysis

CVE-2025-6967 is an Execution After Redirect (EAR) vulnerability classified under CWE-698, affecting the CMS developed by Sarman Soft Software and Technology Services Industry and Trade Ltd. Co. The vulnerability allows attackers to exploit the redirect mechanism within the CMS to execute unauthorized code or actions after a redirect has occurred. This flaw facilitates JSON Hijacking (also known as JavaScript Hijacking), where an attacker can steal sensitive JSON data by exploiting the way the CMS handles redirects and JSON responses. Additionally, the vulnerability enables authentication bypass, allowing attackers to gain unauthorized access without valid credentials. The CVSS 3.1 score of 8.7 reflects a high-severity issue with network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C) that affects confidentiality and integrity severely (C:H/I:H) but does not impact availability (A:N). The vulnerability affects all versions up to 10022026, and the vendor has not issued any patches or responded to disclosure attempts. No known exploits have been reported in the wild yet, but the nature of the vulnerability suggests it could be leveraged for data theft and unauthorized system access. The lack of vendor response and patch availability increases the risk for organizations using this CMS, especially those hosting sensitive or critical data.

Potential Impact

For European organizations using the affected CMS, this vulnerability poses a significant risk of data breaches through JSON Hijacking, potentially exposing sensitive user or organizational data. The authentication bypass aspect could allow attackers to gain unauthorized administrative or user-level access, leading to further compromise, data manipulation, or lateral movement within networks. The high CVSS score indicates that confidentiality and integrity are severely impacted, which could result in loss of trust, regulatory penalties (e.g., GDPR violations), and operational disruptions. Since the vulnerability does not affect availability directly, denial-of-service is less likely, but the unauthorized access and data exposure risks remain critical. Organizations in sectors such as government, finance, healthcare, and critical infrastructure in Europe could be particularly impacted due to the sensitivity of their data and regulatory requirements. The absence of patches and vendor support complicates remediation efforts and increases the urgency for alternative mitigation strategies.

Mitigation Recommendations

1. Immediately conduct an inventory to identify all instances of the affected CMS within the organization’s environment. 2. Implement strict network segmentation and firewall rules to restrict access to the CMS, limiting exposure to trusted IP addresses only. 3. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block suspicious redirect patterns and JSON hijacking attempts. 4. Monitor logs for unusual redirect activity and authentication anomalies that could indicate exploitation attempts. 5. Where possible, disable or restrict redirect functionality in the CMS until a patch or vendor guidance is available. 6. Enforce multi-factor authentication (MFA) on all CMS access points to mitigate authentication bypass risks. 7. Regularly update and patch other components of the web infrastructure to reduce the attack surface. 8. Engage with the vendor or community to track any emerging patches or workarounds. 9. Prepare incident response plans specifically addressing potential exploitation of this vulnerability. 10. Consider migrating to alternative CMS platforms if risk tolerance is low and no timely patch is forthcoming.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TR-CERT
Date Reserved
2025-07-01T11:41:04.863Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698b3db44b57a58fa112edc9

Added to database: 2/10/2026, 2:16:20 PM

Last enriched: 2/10/2026, 2:30:42 PM

Last updated: 2/21/2026, 12:18:13 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats