CVE-2025-12480
CVSS Score
9.1
EPSS Score
0.0%
EPSS Percentile
0th
Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.
| CWE | CWE-284 |
| Vendor | triofox |
| Product | triofox |
| Published | Nov 10, 2025 |
| Last Updated | Feb 26, 2026 |
⚠️ Actively Exploited — Act Now
Get instant alerts for triofox triofox
This vulnerability is actively exploited in the wild. Set up free real-time alerts so you're first to know about threats like CVE-2025-12480.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Affected Versions
TrioFox / TrioFox
0 < 16.7.10368.56560
References
github.com: https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2025/MNDT-2025-0008.md triofox.com: https://www.triofox.com/ access.triofox.com: https://access.triofox.com/releases_history/ cloud.google.com: https://cloud.google.com/blog/topics/threat-intelligence/triofox-vulnerability-cve-2025-12480 cisa.gov: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-12480
Credits
Stallone D’Souza, Mandiant