CVE-2025-48927
The TeleMessage service through 2025-05-05 configures Spring Boot Actuator with an exposed heap dump endpoint at a /heapdump URI, as exploited in...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- May 28, 2025
- Published Date
- May 28, 2025
- Last Updated
- July 30, 2025
- Vendor
- TeleMessage
- Product
- service
- Description
- The TeleMessage service through 2025-05-05 configures Spring Boot Actuator with an exposed heap dump endpoint at a /heapdump URI, as exploited in the wild in May 2025.
- Tags
- Score
- 0.04% (Percentile: 9.11%) as of 2025-06-26
- Exploitation
- active
- Automatable
- Yes
- Technical Impact
- partial
- Exploited in the Wild
- Yes (2025-05-28 17:40:38 UTC) Source
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
EPSS Score
SSVC Information
Exploit Status
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CVE | 2025-05-28 17:40:31 UTC |
Recent Mentions
Hackers scanning for TeleMessage Signal clone flaw exposing passwords
Source: BleepingComputer • Published: 2025-07-18 15:06:05 UTC
Flaw in Signal Clone TeleMessage Exploited En Masse for Password Theft
Source: CyberInsider • Published: 2025-07-18 07:13:30 UTC
Flaw in Signal App Clone Could Leak Passwords — GreyNoise Identifies Active Reconnaissance and Exploit Attempts
Source: GreyNoise • Published: 2025-07-17 00:00:00 UTC
[io.zipkin:zipkin-server] Zipkin Server vulnerable to Insecure Resource Initialization through its /heapdump endpoint
Source: Github Advisory Database (Maven) • Published: 2025-07-04 21:30:32 UTC
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Added to KEVIntel