Home

Description

The TeleMessage service through 2025-05-05 configures Spring Boot Actuator with an exposed heap dump endpoint at a /heapdump URI, as exploited in the wild in May 2025.

PUBLISHED Reserved 2025-05-28 | Published 2025-05-28 | Updated 2025-10-21 | Assigner mitre




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CISA Known Exploited Vulnerability

Date added 2025-07-01 | Due date 2025-07-22

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Problem types

CWE-1188 Initialization of a Resource with an Insecure Default

Product status

Default status
unknown

Any version
affected

References

www.cisa.gov/...erabilities-catalog?field_cve=CVE-2025-48927 government-resource

www.wired.com/...f-app-telemessage-got-hacked-in-20-minutes/

cve.org (CVE-2025-48927)

nvd.nist.gov (CVE-2025-48927)

Download JSON