TeleMessage JSP Heap Dump Disclosure of HTTP Passwords
CVE-2025-48928 Published on May 28, 2025
The TeleMessage service through 2025-05-05 is based on a JSP application in which the heap content is roughly equivalent to a "core dump" in which a password previously sent over HTTP would be included in this dump, as exploited in the wild in May 2025.
Known Exploited Vulnerability
This TeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. TeleMessage TM SGNL contains an exposure of core dump file to an unauthorized control sphere Vulnerability. This vulnerability is based on a JSP application in which the heap content is roughly equivalent to a "core dump" in which a password previously sent over HTTP would be included in this dump.
The following remediation steps are recommended / required by July 22, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Weakness Type
Exposure of Core Dump File to an Unauthorized Control Sphere
The product generates a core dump file in a directory, archive, or other resource that is stored, transferred, or otherwise made accessible to unauthorized actors.
Products Associated with CVE-2025-48928
Want to know whenever a new CVE is published for Smarsh Telemessage? stack.watch will email you.
Affected Versions
TeleMessage service:- Before and including 2025-05-05 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.