CVE-2025-50434
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-08-19

Last updated on: 2025-09-09

Assigner: MITRE

Description
A security issue has been identified in Appian Enterprise Business Process Management version 25.3. The vulnerability is related to incorrect access control, which under certain conditions could allow unauthorized access to information. NOTE: this has been disputed because the CVE Record information does not originate from the Supplier, and the report lacks specificity about why a problem exists, how the behavior could be reproduced, and whether any action could be taken to resolve the problem.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-19
Last Modified
2025-09-09
Generated
2026-05-07
AI Q&A
2025-08-19
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-50434 is an Incorrect Access Control vulnerability in Appian Enterprise Business Process Management version 25.3. It allows unauthorized remote access to certain resources because the access control mechanisms are improperly implemented. This means an attacker can access sensitive data without proper authorization. [1]


How can this vulnerability impact me? :

This vulnerability can lead to information disclosure by allowing attackers to remotely access sensitive data without authorization. This can compromise confidentiality and potentially lead to further exploitation depending on the data accessed. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves incorrect access control allowing unauthorized remote access to certain resources in Appian Enterprise BPM 25.3. Detection would involve monitoring for unauthorized access attempts or unusual access patterns to sensitive resources. Specific commands are not provided in the available resources. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps are not detailed in the provided resources. Generally, to mitigate incorrect access control vulnerabilities, you should restrict access to sensitive resources, apply any available patches or updates from the vendor, and monitor access logs for suspicious activity. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart