CVE Alert: CVE-2025-2776 – SysAid – SysAid On-Prem

CVE-2025-2776

CRITICALCISA KEVExploitation active

SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the Server URL processing functionality, allowing for administrator account takeover and file read primitives.

CVSS v3.1 (9.3)
AV NETWORK · AC LOW · PR NONE · UI NONE · S CHANGED
Vendor
SysAid
Product
SysAid On-Prem
Versions
0 lte 23.3.40
CWE
CWE-611, CWE-611 Improper Restriction of XML External Entity Reference
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L
Published
2025-05-07T14:50:40.717Z
Updated
2025-07-30T01:36:13.719Z

AI Summary Analysis

Risk verdict

Critical risk; treat as priority 1 given active exploitation signals in the KEV and an automatable, unauthenticated exploit path.

Why this matters

An unauthenticated XML External Entity vulnerability enables administrator account takeover and file reading, threatening confidentiality and potential governance exposure. In on‑prem environments, a compromised admin session can cascade to other systems, disrupt IT service operations, and expose sensitive tickets and configuration data.

Most likely attack path

Remote attacker crafts an XML payload targeting the server URL processing component; no authentication or user interaction needed. If successful, read primitives and privilege escalation to admin could follow, with the scope expansion implying broader impact across the application and related services.

Who is most exposed

Organisations hosting the on‑premises IT service management server, especially where the management endpoints are internet‑reachable or inadequately segmented, exposing internal systems to the internet or weakly protected networks.

Detection ideas

  • Anomalous XML requests to the server URL endpoint (DOCTYPE/ENTITY usage).
  • Patterns indicating XML external entity attempts or large entity expansions.
  • Logs showing file reads or access to sensitive paths.
  • Unscheduled admin account activity or privilege changes.
  • Unusual login activity from unfamiliar IPs targeting the admin interface.

Mitigation and prioritisation

  • Apply the latest patch or update; treat as priority 1 due to KEV.
  • If patching isn’t feasible, disable external entity processing or constrain it to trusted inputs.
  • Network controls: restrict access to the server URL endpoint; deploy XXE‑specific WAF rules.
  • Strengthen monitoring: alert on admin activity and critical config changes; verify backups and runbooks.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.