Vulnerability Description
CryptPad is a collaboration suite. Prior to version 2025.3.0, enforcement of Two-Factor Authentication (2FA) in CryptPad can be trivially bypassed, due to weak implementation of access controls. An attacker that compromises a user's credentials can gain access to the victim's account, even if the victim has 2FA set up. This is due to 2FA not being enforced if the path parameter is not 44 characters long, which can be bypassed by simply URL encoding a single character in the path. This issue has been patched in version 2025.3.0.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xwiki | Cryptpad | < 2025.3.0 |
Related Weaknesses (CWE)
References
- https://github.com/cryptpad/cryptpad/blob/15c81aa8ccb737a9a1167481f4a699af331364Product
- https://github.com/cryptpad/cryptpad/commit/0c5d4bbf5e5206d53470ea86a664fa2b703fPatch
- https://github.com/cryptpad/cryptpad/commit/f624f9d457d36040f57c7598d98a8b9461b7Patch
- https://github.com/cryptpad/cryptpad/security/advisories/GHSA-xq5x-wgcm-3p33ExploitVendor Advisory
FAQ
What is CVE-2025-49591?
CVE-2025-49591 is a vulnerability with a CVSS score of 9.1 (CRITICAL). CryptPad is a collaboration suite. Prior to version 2025.3.0, enforcement of Two-Factor Authentication (2FA) in CryptPad can be trivially bypassed, due to weak implementation of access controls. An at...
How severe is CVE-2025-49591?
CVE-2025-49591 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-49591?
Check the references section above for vendor advisories and patch information. Affected products include: Xwiki Cryptpad.