CVE-2025-13163

4.9 MEDIUM

📋 TL;DR

EasyFlow GP software by Digiwin has a vulnerability where database credentials are insufficiently protected, allowing remote attackers with privileged access to obtain plaintext credentials from the system frontend. This affects organizations using vulnerable versions of EasyFlow GP for workflow management.

💻 Affected Systems

Products:
  • EasyFlow GP
Versions: Versions prior to 2025.1.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires privileged access to exploit; affects systems with default configurations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain database credentials, potentially leading to full database compromise, data exfiltration, or lateral movement to other systems.

🟠

Likely Case

Privileged insiders or compromised accounts extract database credentials, enabling unauthorized data access or manipulation.

🟢

If Mitigated

With proper network segmentation and credential rotation, impact is limited to credential exposure without further exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires privileged access but is technically simple once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.1.1

Vendor Advisory: https://www.twcert.org.tw/en/cp-139-10504-23f4c-2.html

Restart Required: Yes

Instructions:

1. Download patch from Digiwin support portal. 2. Backup system and database. 3. Apply patch following vendor instructions. 4. Restart EasyFlow GP services.

🔧 Temporary Workarounds

Restrict Access

all

Limit network access to EasyFlow GP frontend to trusted IPs only.

Use firewall rules to restrict access to EasyFlow GP ports (typically 80/443)

Credential Rotation

all

Change database credentials regularly to limit exposure window.

ALTER USER 'dbuser'@'localhost' IDENTIFIED BY 'new_strong_password';

🧯 If You Can't Patch

  • Implement strict access controls and monitor privileged user activity.
  • Isolate database server from application server and implement network segmentation.

🔍 How to Verify

Check if Vulnerable:

Check EasyFlow GP version in administration panel; versions below 2025.1.1 are vulnerable.

Check Version:

Check version in EasyFlow GP web interface under System Information or Administration settings.

Verify Fix Applied:

Verify version is 2025.1.1 or higher in administration panel and test credential exposure functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to credential-related endpoints
  • Multiple failed authentication attempts followed by credential access

Network Indicators:

  • Unusual outbound connections from EasyFlow GP server to database
  • Traffic patterns indicating credential extraction

SIEM Query:

source="EasyFlowGP" AND (event_type="credential_access" OR endpoint="*/credential*" OR status="sensitive_data_access")

🔗 References

📤 Share & Export