<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2025-60949 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2025-60949/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 24 Mar 2026 14:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2025-60949/feed.xml" rel="self" type="application/rss+xml"/><item><title>Census CSWeb 8.0.1 Configuration File Disclosure Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-census-csweb-config-disclosure/</link><pubDate>Tue, 24 Mar 2026 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-census-csweb-config-disclosure/</guid><description>Census CSWeb 8.0.1 is vulnerable to unauthenticated remote configuration file disclosure via HTTP requests to the `/app/config` path, potentially exposing sensitive secrets; fixed in 8.1.0 alpha.</description><content:encoded><![CDATA[<p>Census CSWeb version 8.0.1 is susceptible to a critical vulnerability (CVE-2025-60949) that allows unauthenticated remote attackers to access sensitive configuration files. This exposure occurs because the <code>/app/config</code> directory is reachable via HTTP in certain deployments. By sending a specially crafted request to this path, an attacker can potentially obtain sensitive information, such as API keys, database credentials, and other secrets stored within the configuration files. This vulnerability was publicly disclosed on March 23, 2026, and a fix is available in version 8.1.0 alpha. Exploitation of this vulnerability can lead to significant data breaches and compromise of the affected system. Defenders should prioritize identifying and patching vulnerable instances.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a target running Census CSWeb 8.0.1.</li>
<li>The attacker sends an HTTP GET request to <code>/app/config</code> directory or specific files within that directory.</li>
<li>The vulnerable server processes the request without proper authentication or access controls.</li>
<li>The server responds with the contents of the configuration files, potentially containing sensitive information.</li>
<li>The attacker parses the configuration files to extract sensitive data, such as API keys, database credentials, or internal IP addresses.</li>
<li>The attacker uses the extracted credentials to gain unauthorized access to databases, APIs, or other systems.</li>
<li>The attacker escalates privileges within the compromised systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-60949 can lead to the exposure of sensitive information, including API keys, database credentials, and other secrets. This can allow attackers to gain unauthorized access to critical systems, leading to data breaches, financial loss, and reputational damage. The vulnerability affects all deployments of Census CSWeb 8.0.1 where the <code>/app/config</code> directory is exposed via HTTP.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Census CSWeb version 8.1.0 alpha or later to patch CVE-2025-60949.</li>
<li>Implement access controls to restrict access to the <code>/app/config</code> directory to authorized personnel only.</li>
<li>Deploy the Sigma rule &ldquo;Detect Unauthenticated Access to Configuration Files&rdquo; to identify potential exploitation attempts.</li>
<li>Monitor web server logs for requests to <code>/app/config</code> to detect unauthorized access attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2025-60949</category><category>information-disclosure</category><category>webserver</category></item></channel></rss>