CVE-2025-54833
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-31

Last updated on: 2025-09-12

Assigner: Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government

Description
OPEXUS FOIAXpress Public Access Link (PAL) version v11.1.0 allows attackers to bypass account-lockout and CAPTCHA protections. Unauthenticated remote attackers can more easily brute force passwords.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-31
Last Modified
2025-09-12
Generated
2026-05-07
AI Q&A
2025-07-31
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
opexus foiaxpress_public_access_link From 11.1.0 (inc) to 11.12.3.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-602 The product is composed of a server that relies on the client to implement a mechanism that is intended to protect the server.
CWE-307 The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in OPEXUS FOIAXpress Public Access Link (PAL) version v11.1.0 allows attackers to bypass account-lockout and CAPTCHA protections. This means unauthenticated remote attackers can attempt to brute force passwords more easily without being blocked or challenged by these security measures.


How can this vulnerability impact me? :

The vulnerability can allow attackers to perform brute force attacks on user accounts without being stopped by account-lockout or CAPTCHA protections. This increases the risk of unauthorized access to accounts, potentially leading to data breaches or unauthorized actions within the affected system.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart