Overview
The vulnerability identified as CVE-2025-49152 poses a significant threat to systems running the MICROSENS NMP Web+ software. This vulnerability arises from the application’s tendency to generate JSON Web Tokens (JWT) that do not expire, which could potentially allow an attacker to gain unauthorized access to the system and compromise sensitive data.
Vulnerability Summary
CVE ID: CVE-2025-49152
Severity: High (7.5 CVSS score)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: Unauthorized access, potential system compromise, and data leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
MICROSENS NMP Web+ | All versions
How the Exploit Works
An attacker can exploit this vulnerability by gaining access to an unexpired JWT. Once this token is in their possession, they can bypass authentication mechanisms and gain unauthorized access to the system. The absence of an expiration date on the token means that it can be used indefinitely, potentially giving the attacker ongoing access.
Conceptual Example Code
Here is a conceptual example of how the vulnerability might be exploited. This example illustrates a potential HTTP request that an attacker might use, with the unexpired JWT included in the Authorization header:
GET /protected/resource HTTP/1.1
Host: target.example.com
Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c
This conceptual code is a representation. The actual exploit would depend on the specific system configuration and the attacker’s capabilities.
Mitigation Guidance
Users are advised to apply any patches provided by the vendor as soon as possible. In the meantime, using a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can provide temporary mitigation by detecting and blocking malicious activity.

