CVE-2025-2777
SysAid On-Prem <= 23.3.40 lshw Proceessing XML External Entity Injection
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- March 24, 2025
- Published Date
- May 07, 2025
- Last Updated
- May 08, 2025
- Vendor
- SysAid
- Product
- SysAid On-Prem
- Description
- SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the lshw processing functionality, allowing for administrator account takeover and file read primitives.
- Tags
- Score
- 13.13% (Percentile: 93.78%) as of 2025-07-21
- Exploitation
- poc
- Automatable
- Yes
- Technical Impact
- partial
- Exploited in the Wild
- Yes (2025-06-24 00:00:00 UTC) Source
nuclei_scanner
CVSS Scores
CVSS v3.1
9.3 - CRITICAL
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L
EPSS Score
SSVC Information
Exploit Status
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
The Shadowserver (via CIRCL) | 2025-06-25 12:00:38 UTC |
Recent Mentions
SysAid Patches 4 Critical Flaws Enabling Pre-Auth RCE in On-Premise Version
Source: TheHackerNews • Published: 2025-05-07 11:31:00 UTC
Cybersecurity researchers have disclosed multiple security flaw in the on-premise version of SysAid IT support software that could be exploited to achieve pre-authenticated remote code execution with elevated privileges.
The vulnerabilities, tracked as CVE-2025-2775, CVE-2025-2776, and CVE-2025-2777, have all been described as XML External Entity (XXE) injections, which occur when an attacker is
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-2777.yaml | 2025-05-10 14:30:22 UTC |
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Detected by Nuclei
-
Added to KEVIntel