Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8590: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in AKCE Software Technology R&D Industry and Trade Inc. SKSPro

0
High
VulnerabilityCVE-2025-8590cvecve-2025-8590cwe-200
Published: Tue Feb 03 2026 (02/03/2026, 07:19:34 UTC)
Source: CVE Database V5
Vendor/Project: AKCE Software Technology R&D Industry and Trade Inc.
Product: SKSPro

Description

CVE-2025-8590 is a high-severity vulnerability in AKCE Software Technology R&D Industry and Trade Inc. 's SKSPro product that allows unauthorized actors to access sensitive information via directory indexing. This vulnerability does not require authentication or user interaction and can be exploited remotely over the network. The exposure of sensitive data can lead to confidentiality breaches without impacting system integrity or availability. No known exploits are currently reported in the wild. European organizations using SKSPro should be vigilant, as this vulnerability could expose critical business or personal data. Mitigation requires disabling directory indexing or applying vendor patches once available. Countries with significant SKSPro deployments or strategic industries relying on this software are at higher risk. Given the CVSS score of 7. 5, this vulnerability demands prompt attention to prevent data leakage.

AI-Powered Analysis

AILast updated: 02/10/2026, 11:06:38 UTC

Technical Analysis

CVE-2025-8590 is a vulnerability categorized under CWE-200, indicating an exposure of sensitive information to unauthorized actors. The issue affects the SKSPro product developed by AKCE Software Technology R&D Industry and Trade Inc., specifically through version 07012026. The root cause is directory indexing being enabled, which allows attackers to enumerate and access directory contents that should otherwise be restricted. This vulnerability can be exploited remotely without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is a high confidentiality breach, as sensitive files or data may be exposed, but there is no impact on integrity or availability. Although no public exploits are currently known, the ease of exploitation and the nature of the vulnerability make it a significant risk. Directory indexing is a common misconfiguration that can reveal configuration files, source code, or other sensitive information that attackers can leverage for further attacks. The vulnerability was reserved in August 2025 and published in February 2026, indicating recent discovery and disclosure. No patches are currently linked, so organizations must implement interim mitigations such as disabling directory indexing or restricting access via web server configurations.

Potential Impact

For European organizations, the exposure of sensitive information through this vulnerability can lead to significant confidentiality breaches, including leakage of intellectual property, customer data, or internal configurations. This can result in regulatory non-compliance, especially under GDPR, leading to potential fines and reputational damage. Attackers gaining insight into internal structures may use this information for targeted attacks, increasing the risk of subsequent exploitation. Since SKSPro is used in industry and trade sectors, the impact could extend to critical business operations and supply chains. The lack of integrity or availability impact limits direct operational disruption, but the confidentiality breach alone is serious. Organizations handling sensitive or personal data are particularly vulnerable. The absence of known exploits provides a window for proactive defense, but the ease of exploitation means attackers could develop exploits quickly.

Mitigation Recommendations

Immediate mitigation steps include disabling directory indexing on all SKSPro installations by configuring the web server or application settings to prevent directory listing. Organizations should audit their SKSPro deployments to identify exposed directories and restrict access using access control lists or IP whitelisting where possible. Monitoring web server logs for unusual directory access attempts can help detect exploitation attempts early. Since no official patches are currently available, organizations should engage with AKCE Software Technology R&D Industry and Trade Inc. for timelines on patch releases and apply them promptly once available. Implementing web application firewalls (WAFs) with rules to block directory enumeration attempts can provide additional protection. Regular security assessments and penetration testing focused on directory traversal and indexing vulnerabilities should be conducted. Finally, organizations should review and update their incident response plans to address potential data exposure incidents stemming from this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TR-CERT
Date Reserved
2025-08-05T09:50:33.306Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6981a400f9fa50a62facb80e

Added to database: 2/3/2026, 7:30:08 AM

Last enriched: 2/10/2026, 11:06:38 AM

Last updated: 3/20/2026, 2:30:08 PM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses