CVE Alert: CVE-2025-11151 – Beyaz Bilgisayar Software Design Industry and Trade Ltd. Co. – CityPLus

CVE-2025-11151

HIGHNo exploitation known

Exposure of Sensitive Information to an Unauthorized Actor, Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Beyaz Bilgisayar Software Design Industry and Trade Ltd. Co. CityPLus allows Detect Unpublicized Web Pages.This issue affects CityPLus: before V24.29500.1.0.

CVSS v3.1 (8.2)
AV NETWORK · AC LOW · PR NONE · UI NONE · S UNCHANGED
Vendor
Beyaz Bilgisayar Software Design Industry and Trade Ltd. Co.
Product
CityPLus
Versions
0 lt V24.29500.1.0
CWE
CWE-200, CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Published
2025-10-21T13:15:39.524Z
Updated
2025-10-21T13:15:39.524Z

AI Summary Analysis

Risk verdict

High risk: remote unauthenticated disclosure of sensitive information via unpublicized CityPLus pages; exploitation requires no user interaction.

Why this matters

Attackers can enumerate hidden resources and extract sensitive data, enabling targeted exfiltration or credential harvesting. For organisations using CityPLus, the vulnerability threatens regulatory compliance, reputational damage, and potential service exposure.

Most likely attack path

External actors scan internet-facing CityPLus endpoints for undocumented pages; no credentials and low attack complexity enable discovery. Successful hits reveal confidential data or internal structure hints, supporting further intrusion or data theft.

Who is most exposed

Deployments with internet-facing CityPLus web interfaces are most at risk, especially on-prem or cloud-hosted instances and multi-tenant setups where misconfigurations expose internal pages.

Detection ideas

  • Probes targeting non-documented endpoints from distributed sources.
  • Unexpected 200 OK responses or verbose error messages for unknown pages.
  • Logs showing access to internal paths or leakage of server/version details.
  • Spikes in unauthenticated GET requests to sensitive areas.
  • WAF/IDS alerts for information-disclosure patterns or directory listing attempts.

Mitigation and prioritisation

  • Patch to V24.29500.1.0 or newer immediately.
  • Disable directory listing; remove exposure of internal pages; enforce authentication/least privilege.
  • Tighten access controls (MFA, IP allowlists for admin endpoints).
  • Harden error handling; ensure responses do not reveal sensitive data.
  • Validate fixes in staging before production; monitor logs post-patch.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features