{ "document": { "category": "csaf_vex", "csaf_version": "2.0", "lang": "en-US", "publisher": { "category": "coordinator", "contact_details": "https://www.cisa.gov/report", "issuing_authority": "CISA", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "title": "OPEXUS FOIAXpress Public Access Link (PAL) multiple vulnerabilities", "tracking": { "current_release_date": "2025-09-09T21:12:34Z", "generator": { "engine": { "name": "VINCE-NT", "version": "1.10.0" } }, "id": "VA-25-174-01", "initial_release_date": "2025-07-31T17:01:09Z", "status": "final", "version": "1.1.1", "revision_history": [ { "number": "1.1.1", "summary": "Updated title", "date": "2025-09-09T21:12:34Z" }, { "number": "1.1.0", "summary": "Updated SSVC", "date": "2025-08-07T18:50:18Z" }, { "number": "1.0.0", "summary": "Initial publication", "date": "2025-07-31T17:01:09Z" } ] }, "distribution": { "tlp": { "label": "WHITE" } }, "notes": [ { "text": "All information products included in [https://github.com/cisagov/CSAF/tree/develop/csaf_files/IT/white](https://github.com/cisagov/CSAF/tree/develop/csaf_files/IT/white) are provided \\\"as is\\\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see [https://us-cert.cisa.gov/tlp/](https://us-cert.cisa.gov/tlp/).", "title": "Legal Notice", "category": "legal_disclaimer" }, { "text": "Worldwide", "title": "Countries and Areas Deployed", "category": "other" }, { "text": "Information Technology", "title": "Critical Infrastructure Sectors", "category": "other" }, { "text": "Multiple vulnerabilities could allow unauthenticated attackers to bypass rate-limiting measures for login attempts, or check for the existence of other users. Low-privileged users can modify certain site content without authorization.", "title": "Risk Evaluation", "category": "summary" }, { "text": "Upgrade to OPEXUS FOIAXpress PAL version 11.12.3.0.", "title": "Recommended Practices", "category": "general" }, { "text": "United States", "title": "Company Headquarters Location", "category": "other" }, { "text": "Per OPEXUS: \n\nThe vulnerability has been addressed and resolved in the June 2025 release, version 11.12.3.0\n \nCAPTCHA Bypass - Resolved\nSQL Injection - Resolved\nEmail HTML Injection - Resolved\n \nhttps://docs.opexustech.com/docs/foiaxpress/11.12.0/FOIAXpress_Release_Notes_11.12.3.0.pdf", "title": "Vendor Statement", "category": "description" } ], "references": [ { "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-174-01.json", "summary": "Vulnerability Advisory VA-25-174-01 CSAF", "category": "self" } ] }, "product_tree": { "branches": [ { "category": "vendor", "name": "OPEXUS", "branches": [ { "category": "product_name", "name": "FOIAXpress Public Access Link (PAL)", "branches": [ { "category": "product_version_range", "name": ">=11.1.0|<11.12.3.0", "product": { "name": "OPEXUS FOIAXpress Public Access Link (PAL) >=11.1.0|<11.12.3.0", "product_id": "CSAFPID-0001" } }, { "category": "product_version", "name": "11.12.3.0", "product": { "name": "OPEXUS FOIAXpress Public Access Link (PAL) 11.12.3.0", "product_id": "CSAFPID-0002" } } ] } ] } ] }, "vulnerabilities": [ { "cve": "CVE-2025-54832", "cwe": { "id": "CWE-472", "name": "External Control of Assumed-Immutable Web Parameter" }, "notes": [ { "category": "summary", "text": "OPEXUS FOIAXpress Public Access Link (PAL), version v11.1.0, allows an authenticated user to add entries to the list of states and territories.", "title": "Description" }, { "category": "details", "title": "SSVC", "text": "SSVCv2/E:N/A:N/T:P/2025-08-07T18:43:30Z/" }, { "category": "description", "text": "Per OPEXUS: \"The vulnerability has been addressed and resolved in the June 2025 release, version 11.12.3.0\"", "title": "Vendor statement from OPEXUS" } ], "title": "OPEXUS FOIAXpress Public Access Link (PAL) state and territory list unauthorized modification", "product_status": { "known_affected": [ "CSAFPID-0001" ], "fixed": [ "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "Vulnerability Advisory VA-25-174-01 CSAF", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-174-01.json" }, { "category": "external", "summary": "CVE-2025-54832", "url": "https://www.cve.org/CVERecord?id=CVE-2025-54832" }, { "category": "external", "summary": "FOIAXpress Release Notes V11.12.3.0", "url": "https://docs.opexustech.com/docs/foiaxpress/11.12.0/FOIAXpress_Release_notes_11.12.3.0.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "remediations": [ { "category": "vendor_fix", "details": "Fixed in 11.12.3.0.", "url": "https://docs.opexustech.com/docs/foiaxpress/11.12.0/FOIAXpress_Release_notes_11.12.3.0.pdf", "product_ids": [ "CSAFPID-0001" ], "date": "2025-06-30T00:00:00Z" }, { "category": "vendor_fix", "details": "Fixed in 11.12.3.0.", "url": "https://docs.opexustech.com/docs/foiaxpress/11.12.0/FOIAXpress_Release_notes_11.12.3.0.pdf", "product_ids": [ "CSAFPID-0002" ], "date": "2025-06-30T00:00:00Z" } ], "acknowledgments": [ { "organization": "CISA", "names": [ "Nathan Spidle" ] } ], "release_date": "2025-06-30T00:00:00Z" }, { "cve": "CVE-2025-54833", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "notes": [ { "category": "summary", "text": "OPEXUS FOIAXpress Public Access Link (PAL) version v11.1.0 allows attackers to bypass account-lockout and CAPTCHA protections. Unauthenticated remote attackers can more easily brute force passwords.", "title": "Description" }, { "category": "details", "title": "SSVC", "text": "SSVCv2/E:N/A:Y/T:P/2025-08-07T18:40:46Z/" }, { "category": "description", "text": "Per OPEXUS: \"Reference: frekimite-84 CAPTCHA Bypass on PalLogin.aspx in PAL application. v11.12.3.0 Release fix the vulnerability.\"", "title": "Vendor statement from OPEXUS" } ], "title": "OPEXUS FOIAXpress Public Access Link (PAL) account-lockout and CAPTCHA protection bypass", "product_status": { "known_affected": [ "CSAFPID-0001" ], "fixed": [ "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "Vulnerability Advisory VA-25-174-01 CSAF", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-174-01.json" }, { "category": "external", "summary": "CVE-2025-54833", "url": "https://www.cve.org/CVERecord?id=CVE-2025-54833" }, { "category": "external", "summary": "FOIAXpress Release Notes V11.12.3.0", "url": "https://docs.opexustech.com/docs/foiaxpress/11.12.0/FOIAXpress_Release_notes_11.12.3.0.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "remediations": [ { "category": "vendor_fix", "details": "Fixed in 11.12.3.0.", "url": "https://docs.opexustech.com/docs/foiaxpress/11.12.0/FOIAXpress_Release_notes_11.12.3.0.pdf", "product_ids": [ "CSAFPID-0001" ], "date": "2025-06-30T00:00:00Z" }, { "category": "vendor_fix", "details": "Fixed in 11.12.3.0.", "url": "https://docs.opexustech.com/docs/foiaxpress/11.12.0/FOIAXpress_Release_notes_11.12.3.0.pdf", "product_ids": [ "CSAFPID-0002" ], "date": "2025-06-30T00:00:00Z" } ], "acknowledgments": [ { "organization": "CISA", "names": [ "Nathan Spidle" ] } ], "release_date": "2025-06-30T00:00:00Z" }, { "cve": "CVE-2025-54834", "cwe": { "id": "CWE-204", "name": "Observable Response Discrepancy" }, "notes": [ { "category": "summary", "text": "OPEXUS FOIAXpress Public Access Link (PAL) version v11.1.0 allows an unauthenticated, remote attacker to query the /App/CreateRequest.aspx endpoint to check for the existence of valid usernames. There are no rate-limiting mechanisms in place.", "title": "Description" }, { "category": "details", "title": "SSVC", "text": "SSVCv2/E:P/A:Y/T:P/2025-06-12T17:01:51Z/" }, { "category": "description", "text": "Per OPEXUS: \"The vulnerability has been addressed and resolved in the June 2025 release, version 11.12.3.0\"", "title": "Vendor statement from OPEXUS" } ], "title": "OPEXUS FOIAXpress Public Access Link (PAL) unauthenticated username enumeration", "product_status": { "known_affected": [ "CSAFPID-0001" ], "fixed": [ "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "Vulnerability Advisory VA-25-174-01 CSAF", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-174-01.json" }, { "category": "external", "summary": "CVE-2025-54834", "url": "https://www.cve.org/CVERecord?id=CVE-2025-54834" }, { "category": "external", "summary": "FOIAXpress Release Notes V11.12.3.0", "url": "https://docs.opexustech.com/docs/foiaxpress/11.12.0/FOIAXpress_Release_notes_11.12.3.0.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "remediations": [ { "category": "vendor_fix", "details": "Fixed in 11.12.3.0.", "url": "https://docs.opexustech.com/docs/foiaxpress/11.12.0/FOIAXpress_Release_notes_11.12.3.0.pdf", "product_ids": [ "CSAFPID-0001" ], "date": "2025-06-30T00:00:00Z" }, { "category": "vendor_fix", "details": "Fixed in 11.12.3.0.", "url": "https://docs.opexustech.com/docs/foiaxpress/11.12.0/FOIAXpress_Release_notes_11.12.3.0.pdf", "product_ids": [ "CSAFPID-0002" ], "date": "2025-06-30T00:00:00Z" } ], "acknowledgments": [ { "organization": "CISA", "names": [ "Nathan Spidle" ] } ], "release_date": "2025-06-30T00:00:00Z" } ] }