Overview
The CVE-2025-57430 vulnerability pertains to Creacast Creabox Manager 4.4.4, a popular content management system. The product exposes sensitive configuration data via a public endpoint, potentially leading to unauthorized system access and data leakage. This vulnerability is of significant concern due to the potential for system compromise and the potential to reveal plaintext admin credentials.
Vulnerability Summary
CVE ID: CVE-2025-57430
Severity: High (CVSS: 7.5)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: Unauthorized system access and potential data leakage
Affected Products
A new way to communicate
Ameeba Chat is built on encrypted identity, not personal profiles.
Message, call, share files, and coordinate with identities kept separate.
- • Encrypted identity
- • Ameeba Chat authenticates access
- • Aliases and categories
- • End-to-end encrypted chat, calls, and files
- • Secure notes for sensitive information
Private communication, rethought.
Product | Affected Versions
Creacast Creabox Manager | 4.4.4
How the Exploit Works
The vulnerability arises from an exposed endpoint (/get) that, when accessed, returns sensitive internal configuration data. Among the information exposed is the creacodec.lua file, which contains plaintext admin credentials. An attacker can access this endpoint without any required user interaction or privileges, making it a significant security risk.
Conceptual Example Code
This conceptual example demonstrates how the vulnerability might be exploited:
GET /get HTTP/1.1
Host: target.example.com
Content-Type: application/json
Upon sending this request, the sensitive configuration data, including the plaintext admin credentials, would be returned by the server, and could then be used for unauthorized system access.
Mitigation
The recommended mitigation for this vulnerability is to apply the vendor-supplied patch. If the patch is not immediately available or feasible to apply, a temporary mitigation can be achieved using a Web Application Firewall (WAF) or Intrusion Detection System (IDS) to block or monitor access to the vulnerable endpoint.
