CVE-2025-5512: quequnlong shiyi-blog Administrator Backend verifyPassword improper authentication

7.3 CVSS

Description

A vulnerability, which was classified as critical, was found in quequnlong shiyi-blog up to 1.2.1. Affected is an unknown function of the file /api/sys/user/verifyPassword/ of the component Administrator Backend. The manipulation leads to improper authentication. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. Es wurde eine Schwachstelle in quequnlong shiyi-blog bis 1.2.1 gefunden. Sie wurde als kritisch eingestuft. Hiervon betroffen ist ein unbekannter Codeblock der Datei /api/sys/user/verifyPassword/ der Komponente Administrator Backend. Dank der Manipulation mit unbekannten Daten kann eine improper authentication-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.

Classification

CVE ID: CVE-2025-5512

CVSS Base Severity: HIGH

CVSS Base Score: 7.3

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Problem Types

Improper Authentication

Affected Products

Vendor: quequnlong

Product: shiyi-blog

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.07% (probability of being exploited)

EPSS Percentile: 20.79% (scored less or equal to compared to others)

EPSS Date: 2025-06-06 (when was this score calculated)

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: poc

SSVC Technical Impact: partial

SSVC Automatable: true

References

https://nvd.nist.gov/vuln/detail/CVE-2025-5512
https://vuldb.com/?id.310926
https://vuldb.com/?ctiid.310926
https://vuldb.com/?submit.584491
https://github.com/uglory-gll/javasec/blob/main/shiyi-blog.md
https://github.com/uglory-gll/javasec/blob/main/shiyi-blog.md#32attackers-can-bypass-screen-lock-to-access-the-backend

Timeline