CVE-2025-13165

7.5 HIGH

📋 TL;DR

EasyFlow GP developed by Digiwin has an unauthenticated remote denial-of-service vulnerability. Attackers can send specific requests to crash the web service, affecting all users of vulnerable versions. This impacts organizations using EasyFlow GP for workflow management.

💻 Affected Systems

Products:
  • EasyFlow GP
Versions: All versions before the security patch
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects EasyFlow GP installations with web service enabled. The vulnerability exists in the web interface component.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete web service outage making EasyFlow GP inaccessible to all users, disrupting business workflows until service is restored.

🟠

Likely Case

Intermittent service disruptions affecting productivity and workflow processing capabilities.

🟢

If Mitigated

Minimal impact with proper network segmentation and rate limiting preventing exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires sending specific crafted requests to the web service endpoint. No authentication is required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check with Digiwin for specific patched version

Vendor Advisory: https://www.twcert.org.tw/en/cp-139-10504-23f4c-2.html

Restart Required: Yes

Instructions:

1. Contact Digiwin support for the security patch. 2. Backup current configuration. 3. Apply the patch following vendor instructions. 4. Restart the EasyFlow GP service. 5. Verify service functionality.

🔧 Temporary Workarounds

Network Access Control

all

Restrict access to EasyFlow GP web service to trusted IP addresses only

Web Application Firewall

all

Implement WAF rules to block suspicious requests to the web service

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate EasyFlow GP from untrusted networks
  • Deploy rate limiting and request filtering at the network perimeter

🔍 How to Verify

Check if Vulnerable:

Check EasyFlow GP version against vendor advisory. Monitor for service crashes after receiving specific web requests.

Check Version:

Check version through EasyFlow GP administration interface or consult vendor documentation

Verify Fix Applied:

Verify patch installation and test service stability under normal and stress conditions.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed connection attempts
  • Service crash logs
  • Unusual request patterns to web endpoints

Network Indicators:

  • High volume of requests to EasyFlow GP web ports
  • Requests with unusual patterns or payloads

SIEM Query:

source="EasyFlow GP" AND (event_type="service_crash" OR status="500")

🔗 References

📤 Share & Export