🔐 CVE Alert

CVE-2025-12480

CRITICAL 9.1 ⚠️ CISA KEV
CVSS Score
9.1
EPSS Score
0.0%
EPSS Percentile
0th

Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.

CWE CWE-284
Vendor triofox
Product triofox
Published Nov 10, 2025
Last Updated Feb 26, 2026
⚠️ Actively Exploited — Act Now

Get instant alerts for triofox triofox

This vulnerability is actively exploited in the wild. Set up free real-time alerts so you're first to know about threats like CVE-2025-12480.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

TrioFox / TrioFox
0 < 16.7.10368.56560

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2025/MNDT-2025-0008.md triofox.com: https://www.triofox.com/ access.triofox.com: https://access.triofox.com/releases_history/ cloud.google.com: https://cloud.google.com/blog/topics/threat-intelligence/triofox-vulnerability-cve-2025-12480 cisa.gov: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-12480

Credits

Stallone D’Souza, Mandiant