CVE-2025-2777

SysAid On-Prem <= 23.3.40 lshw Proceessing XML External Entity Injection

Basic Information

CVE State
PUBLISHED
Reserved Date
March 24, 2025
Published Date
May 07, 2025
Last Updated
May 08, 2025
Vendor
SysAid
Product
SysAid On-Prem
Description
SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the lshw processing functionality, allowing for administrator account takeover and file read primitives.
Tags
nuclei_scanner

CVSS Scores

CVSS v3.1

9.3 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L

EPSS Score

Score
13.13% (Percentile: 93.78%) as of 2025-07-21

SSVC Information

Exploitation
poc
Automatable
Yes
Technical Impact
partial

Exploit Status

Exploited in the Wild
Yes (2025-06-24 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
The Shadowserver (via CIRCL) 2025-06-25 12:00:38 UTC

Recent Mentions

SysAid Patches 4 Critical Flaws Enabling Pre-Auth RCE in On-Premise Version

Source: TheHackerNews • Published: 2025-05-07 11:31:00 UTC

Cybersecurity researchers have disclosed multiple security flaw in the on-premise version of SysAid IT support software that could be exploited to achieve pre-authenticated remote code execution with elevated privileges. The vulnerabilities, tracked as CVE-2025-2775, CVE-2025-2776, and CVE-2025-2777, have all been described as XML External Entity (XXE) injections, which occur when an attacker is

Scanner Integrations

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Detected by Nuclei

  • Added to KEVIntel