CVE-2025-48572

HIGH CISA KEV

CVSS v3

7.8

HIGH

EPSS Score

0.2%

exploit probability

CISA KEV

Yes

known exploited

Exploitation

SSVC status

Description

In multiple locations, there is a possible way to launch activities from the background due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

CISA Known Exploited Vulnerability

Date Added
12/2/2025
Patch Due Date
12/23/2025
Required Action
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Technical Details

CVSS v3 Vector
3.1
Published
12/8/2025
Last Modified
12/10/2025

Frequently Asked Questions

What is CVE-2025-48572?

In multiple locations, there is a possible way to launch activities from the background due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Is CVE-2025-48572 actively exploited?

Yes. CVE-2025-48572 is on the CISA Known Exploited Vulnerabilities (KEV) catalog, meaning it has been confirmed as actively exploited in the wild. CISA requires federal agencies to patch by 12/23/2025.

What is the CVSS score for CVE-2025-48572?

CVE-2025-48572 has a CVSS v3 base score of 7.8 (HIGH severity), with vector string 3.1.

Is CVE-2025-48572 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.

CVE-2025-48572 Vulnerability — CVSS 7.8, HIGH Severity | isMalicious