CVE-2025-54833
BaseFortify
Publication date: 2025-07-31
Last updated on: 2025-09-12
Assigner: Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| opexus | foiaxpress_public_access_link | From 11.1.0 (inc) to 11.12.3.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-602 | The product is composed of a server that relies on the client to implement a mechanism that is intended to protect the server. |
| CWE-307 | The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in OPEXUS FOIAXpress Public Access Link (PAL) version v11.1.0 allows attackers to bypass account-lockout and CAPTCHA protections. This means unauthenticated remote attackers can attempt to brute force passwords more easily without being blocked or challenged by these security measures.
How can this vulnerability impact me? :
The vulnerability can allow attackers to perform brute force attacks on user accounts without being stopped by account-lockout or CAPTCHA protections. This increases the risk of unauthorized access to accounts, potentially leading to data breaches or unauthorized actions within the affected system.