CVE-2025-25231

Known Exploited Vulnerability Entry External Catalog

Entry Details

CVE-2025-25231

Confirmed

Yes

2025-09-09 00:00 UTC


Timestamps

2025-09-09

2025-09-09


Scope

Affected: Omnissa / Omnissa Workspace ONE UEM | Description: Omnissa Workspace ONE UEM contains a Secondary Context Path Traversal Vulnerability. A malicious actor may be able to gain access to sensitive information by sending crafted GET requests (read-only) to restricted API endpoints | Origin source: CERT-PL | Notes: https://moje.cert.pl/komunikaty/2025/29/aktywnie-wykorzystywana-krytyczna-podatnosc-w-narzedziu-omnissa-workspace-one-uem-airwatch-mdm/


References
  • {'id': 'CVE-2025-25231', 'url': 'https://www.cve.org/CVERecord?id=CVE-2025-25231'}
  • {'id': 'EUVD-2025-24160', 'url': 'https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-24160'}
  • {'id': 'source', 'url': 'https://moje.cert.pl/komunikaty/2025/29/aktywnie-wykorzystywana-krytyczna-podatnosc-w-narzedziu-omnissa-workspace-one-uem-airwatch-mdm/'}

06eada7c-1ab5-44fe-afd3-79a5dd68784a

cce329bf-df49-4c6e-a027-80be2e6483bd

2026-02-02 13:23 UTC

2026-02-06 07:53 UTC

Evidence (1)
Type Source Signal Confidence Details GCVE Metadata
csirt_report enisa-cnw-kev successful_exploitation 0.75
View details
{
  "catalog": "ENISA / EU CSIRTs Network (CNW) KEV CSV",
  "cwes": "-",
  "dateReported": "09/09/25",
  "euvd": "EUVD-2025-24160",
  "exploitationType": "-",
  "notes": "https://moje.cert.pl/komunikaty/2025/29/aktywnie-wykorzystywana-krytyczna-podatnosc-w-narzedziu-omnissa-workspace-one-uem-airwatch-mdm/",
  "originSource": "CERT-PL",
  "product": "Omnissa Workspace ONE UEM",
  "threatActorsExploiting": "-",
  "vendorProject": "Omnissa",
  "vulnerabilityName": "-"
}
-