CVE Alert: CVE-2025-2775 – SysAid – SysAid On-Prem

CVE-2025-2775

CRITICALCISA KEVExploitation active

SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the Checkin processing functionality, allowing for administrator account takeover and file read primitives.

CVSS v3.1 (9.3)
AV NETWORK · AC LOW · PR NONE · UI NONE · S CHANGED
Vendor
SysAid
Product
SysAid On-Prem
Versions
0 lte 23.3.40
CWE
CWE-611, CWE-611 Improper Restriction of XML External Entity Reference
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L
Published
2025-05-07T14:43:23.817Z
Updated
2025-07-30T01:36:13.869Z

AI Summary Analysis

Risk verdict

Critical: unauthenticated XXE in the on‑prem Checkin service enables administrator account takeover; exploitation is active, treat as priority 1.

Why this matters

An attacker can achieve admin privileges and read sensitive files without user interaction, enabling data exposure and potential persistence. The on‑prem, network-accessible nature of the Checkin endpoint makes exposed or poorly segmented deployments especially attractive targets.

Most likely attack path

No user interaction required; the attacker sends crafted XML over the network to the Checkin service to trigger external entity processing and read local files, escalating to admin. The scope change indicates potential impact across connected components, increasing the likelihood of broader compromise.

Who is most exposed

Common in organisations with on‑prem management interfaces (IT, healthcare, MSPs) and those exposing management portals or VPN access to the Checkin service; failures in network segmentation or access controls heighten risk.

Detection ideas

  • Look for XML payloads containing DOCTYPE/ENTITY declarations in Checkin requests.
  • Unusual or unauthorized attempts to access admin-privileged endpoints from external or new internal IPs.
  • Logs showing unexpected file read operations or abnormal privilege changes.
  • Spikes in network traffic to the Checkin service from previously unseen sources.
  • Anomalous authentication events indicating privilege escalations.

Mitigation and prioritisation

  • Apply vendor patch or upgrade to a version that fixes XXE (treat as priority 1).
  • If patching isn’t immediate, block external access to the Checkin endpoint and enforce network segmentation; implement WAF rules to block XXE patterns.
  • Harden XML processing: disable external entities, enforce strict schema validation, and restrict file-system access during parsing.
  • Impose input validation, strict logging, and alert on admin-privilege changes; include change-management for the upgrade.
  • Verify backups and rehearse a rapid recovery plan in case of compromise.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.