Vulnerability Description
Census CSWeb 8.0.1 allows "app/config" to be reachable via HTTP in some deployments. A remote, unauthenticated attacker could send requests to configuration files and obtain leaked secrets. Fixed in 8.1.0 alpha.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Csprousers | Csweb | 8.0.1 |
Related Weaknesses (CWE)
References
- https://github.com/csprousers/csweb/commit/eba0b59a243390a1a4f9524cce6dbc0314bf0Patch
- https://github.com/hx381/cspro-exploitsThird Party Advisory
- https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2026/Broken Link
- https://www.cve.org/CVERecord?id=CVE-2025-60949Third Party Advisory
FAQ
What is CVE-2025-60949?
CVE-2025-60949 is a vulnerability with a CVSS score of 9.1 (CRITICAL). Census CSWeb 8.0.1 allows "app/config" to be reachable via HTTP in some deployments. A remote, unauthenticated attacker could send requests to configuration files and obtain leaked secrets. Fixed in 8...
How severe is CVE-2025-60949?
CVE-2025-60949 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-60949?
Check the references section above for vendor advisories and patch information. Affected products include: Csprousers Csweb.