CVE Alert: CVE-2025-9848 – ScriptAndTools – Real Estate Management System

CVE-2025-9848

HIGHNo exploitation knownPoC observed

A security vulnerability has been detected in ScriptAndTools Real Estate Management System 1.0. The affected element is an unknown function of the file /admin/userlist.php. Such manipulation leads to execution after redirect. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.

CVSS v3.1 (7.3)
Vendor
ScriptAndTools
Product
Real Estate Management System
Versions
1.0
CWE
CWE-698, Execution After Redirect
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-03T01:02:10.151Z
Updated
2025-09-03T20:16:02.907Z

AI Summary Analysis

Risk verdict

High risk: a publicly disclosed PoC enables remote, unauthenticated code execution via the userlist.php redirect flow; patch urgently.

Why this matters

Real estate management systems store sensitive tenant data and financial details. Exploitation could enable data theft, site takeovers or lateral movement within networks. The absence of user interaction lowers the barrier for automated, high-volume attacks.

Most likely attack path

Attacker targets /admin/userlist.php, using the redirect manipulation to execute code on the server without authentication, then accesses data stores or pivots to adjacent hosts. Remote, low-complexity access and no UI interaction increase the chance of rapid, automated exploitation.

Who is most exposed

Publicly reachable admin interfaces on older deployments (especially SMBs hosting the app themselves or via shared hosting) are at highest risk.

Detection ideas

  • Unusual 302 redirects from /admin/userlist.php to external domains
  • newly spawned web processes or webshell indicators on the server
  • Anomalous admin activity or spike in failed/successful admin access
  • PoC signatures or known exploit strings appearing in logs

Mitigation and prioritisation

  • Apply the vendor patch or upgrade to a fixed release; verify integrity.
  • If patch absent, implement WAF rules to block unauthenticated redirects; apply IP allowlisting for the admin UI.
  • Enforce strong authentication, least privilege, and monitor admin endpoints for anomalies.
  • Change-management: test in staging, schedule a coordinated production deployment.
  • If KEV true or EPSS ≥ 0.5, treat as priority 1 (otherwise maintain high-priority remediation).

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.