TeleMessage service exposes an unauthenticated Spring Boot Actuator /heapdump endpoint that allows attackers to extract sensitive credentials remotely. This vulnerability is actively exploited in the wild and affects internet-facing enterprise messaging systems.
Data Source: CIRCL
Confidence: HIGH
Exploitation Method: DIRECT_NETWORK
CVE Published: 2025-05-28
Added to CISA KEV: 2025-07-01 34 DAYS BETWEEN CVE AND KEV
However, CVE-2025-48927 is remotely exploitable and requires no user interaction. It exists in TeleMessage TM SGNL, a Signal clone that archives ...
A vulnerability disclosed in May 2025, CVE-2025-48927 , affects certain deployments of TeleMessage TM SGNL, an enterprise messaging system modeled ...
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-48927 TeleMessage TM SGNL Initialization of a Resource with an Insecure Default Vulnerability.
HireVue Applicant Reasonable Accommodations Process. Hiring. Resume & Application Tips. Students & Recent Graduates. Veteran and Military Spouses.CVE-2025-48927.
Checking the Scope of CVE-2025-48927 CVE-2025-48927 found in TeleMessage TM SGNL in May, and reported by KEV in July, allows attackers to trivially extract sensitive credentials via an unauthenticated, exposed /heapdump endpoint.