CVE-2025-58462
OPEXUS · OPEXUS FOIAXpress Public Access Link Multiple Products
A critical vulnerability has been identified in the OPEXUS FOIAXpress Public Access Link (PAL) component, which allows a remote, unauthenticated attacker to take full control of the application's back.
Executive summary
A critical vulnerability has been identified in the OPEXUS FOIAXpress Public Access Link (PAL) component, which allows a remote, unauthenticated attacker to take full control of the application's backend database. Successful exploitation could lead to the complete compromise of data confidentiality, integrity, and availability, enabling attackers to steal, modify, or delete any information stored in the database. Due to its high severity and ease of exploitation, immediate remediation is required.
Vulnerability
The vulnerability is a SQL Injection flaw in the SearchPopularDocs.aspx page of the Public Access Link. An unauthenticated attacker can send specially crafted input to this web page, which is then improperly processed and included directly in SQL queries executed against the backend database. This allows the attacker to execute arbitrary SQL commands, bypassing all authentication and authorization controls to read, modify, or delete any data in the database, and in some configurations, potentially execute commands on the underlying operating system.
Business impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. The business impact is severe, as the affected component is public-facing and requires no authentication to exploit. A successful attack could result in a significant data breach, exposing sensitive information submitted through Freedom of Information Act (FOIA) requests, including personally identifiable information (PII) and confidential organizational data. The potential consequences include reputational damage, regulatory fines, legal liability, and loss of public trust. Furthermore, an attacker could manipulate or delete records, compromising data integrity and disrupting critical business operations.
Remediation
Immediate Action: Immediately upgrade all instances of OPEXUS FOIAXpress Public Access Link to version 11.13.1.0 or later to patch the vulnerability. After patching, it is crucial to review web server and database logs for any signs of exploitation that may have occurred prior to the update.
Proactive Monitoring: Implement enhanced monitoring of web server access logs for suspicious requests to SearchPopularDocs.aspx, particularly those containing SQL keywords (e.g., SELECT, UNION, DROP, '--') or unusual character strings. Monitor database logs for abnormal queries, unexpected errors, or queries executed by the web application's service account that are outside of normal operational parameters. Network monitoring should be configured to detect potential data exfiltration.
Compensating Controls: If immediate patching is not feasible, deploy a Web Application Firewall (WAF) with strict rulesets designed to detect and block SQL injection attacks. Restrict access to the SearchPopularDocs.aspx page if it is not essential for business operations. Ensure the database service account has been configured with the principle of least privilege to limit the impact of a potential compromise.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the critical CVSS score of 9.8 and the unauthenticated, remote nature of this vulnerability, we strongly recommend that organizations apply the vendor-supplied patch to all affected systems with the highest priority. Although there is no evidence of active exploitation at this time, vulnerabilities of this type are highly sought after by threat actors. The risk of compromise is substantial, and organizations should assume that attackers will develop an exploit in the near future. Immediate remediation is the only effective way to mitigate this critical risk.