Home

Description

The TeleMessage service through 2025-05-05 is based on a JSP application in which the heap content is roughly equivalent to a "core dump" in which a password previously sent over HTTP would be included in this dump, as exploited in the wild in May 2025.

PUBLISHED Reserved 2025-05-28 | Published 2025-05-28 | Updated 2026-02-26 | Assigner mitre




MEDIUM: 4.0CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CISA Known Exploited Vulnerability

Date added 2025-07-01 | Due date 2025-07-22

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Problem types

CWE-528 Exposure of Core Dump File to an Unauthorized Control Sphere

Product status

Default status
unknown

Any version
affected

References

www.cisa.gov/...erabilities-catalog?field_cve=CVE-2025-48928 government-resource

www.wired.com/...f-app-telemessage-got-hacked-in-20-minutes/

cve.org (CVE-2025-48928)

nvd.nist.gov (CVE-2025-48928)

Download JSON