CVE-2025-49551
BaseFortify
Publication date: 2025-07-08
Last updated on: 2025-07-11
Assigner: Adobe Systems Incorporated
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2021 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2023 |
| adobe | coldfusion | 2025 |
| adobe | coldfusion | 2025 |
| adobe | coldfusion | 2025 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-798 | The product contains hard-coded credentials, such as a password or cryptographic key. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Use of Hard-coded Credentials issue in ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier. It allows an attacker to escalate privileges by exploiting credentials that are embedded in the software code. The attacker can gain unauthorized access to sensitive systems or data without requiring any user interaction. The vulnerable component is accessible only from internal IP addresses.
How can this vulnerability impact me? :
The vulnerability can lead to privilege escalation, allowing an attacker to gain unauthorized access to sensitive systems or data. This can compromise the confidentiality, integrity, and availability of your systems and information. Since exploitation does not require user interaction, it can be triggered remotely from internal networks, increasing the risk of internal threats or lateral movement by attackers.