Vulnerability Description
The TeleMessage service through 2025-05-05 configures Spring Boot Actuator with an exposed heap dump endpoint at a /heapdump URI, as exploited in the wild in May 2025.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Smarsh | Telemessage | - |
Related Weaknesses (CWE)
References
- https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-Press/Media Coverage
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-US Government Resource
FAQ
What is CVE-2025-48927?
CVE-2025-48927 is a vulnerability with a CVSS score of 5.3 (MEDIUM). The TeleMessage service through 2025-05-05 configures Spring Boot Actuator with an exposed heap dump endpoint at a /heapdump URI, as exploited in the wild in May 2025.
How severe is CVE-2025-48927?
CVE-2025-48927 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-48927?
Check the references section above for vendor advisories and patch information. Affected products include: Smarsh Telemessage.