Vulnerability Description
The TeleMessage archiving backend through 2025-05-05 holds cleartext copies of messages from TM SGNL (aka Archive Signal) app users, which is different functionality than described in the TeleMessage "End-to-End encryption from the mobile phone through to the corporate archive" documentation, as exploited in the wild in May 2025.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Telemessage | Text Message Archiver | <= 2025-05-05 |
Related Weaknesses (CWE)
References
- https://arstechnica.com/security/2025/05/signal-clone-used-by-trump-official-stoPress/Media Coverage
- https://news.ycombinator.com/item?id=43909220Press/Media Coverage
- https://www.theregister.com/2025/05/05/telemessage_investigating/Press/Media Coverage
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-US Government Resource
FAQ
What is CVE-2025-47729?
CVE-2025-47729 is a vulnerability with a CVSS score of 1.9 (LOW). The TeleMessage archiving backend through 2025-05-05 holds cleartext copies of messages from TM SGNL (aka Archive Signal) app users, which is different functionality than described in the TeleMessage ...
How severe is CVE-2025-47729?
CVE-2025-47729 has been rated LOW with a CVSS base score of 1.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-47729?
Check the references section above for vendor advisories and patch information. Affected products include: Telemessage Text Message Archiver.