Cleartext Message Exposure in TeleMessage Archiving Backend
CVE-2025-47729

4.9MEDIUM

Key Information:

Vendor
CVE Published:
8 May 2025

Badges

🔥 Trending now📈 Trended📈 Score: 1,440👾 Exploit Exists🦅 CISA Reported📰 News Worthy

What is CVE-2025-47729?

CVE-2025-47729 is a vulnerability found in the TeleMessage archiving backend, specifically affecting the TM SGNL application used for messaging. The flaw allows for the storage of cleartext copies of messages, which contradicts the promises of end-to-end encryption that users expect from the service. By exposing these messages in an unencrypted form, the vulnerability raises significant security concerns, as sensitive communications could be intercepted and misused. Organizations relying on TeleMessage for secure messaging and archiving face an increased risk of data breaches and loss of confidentiality, particularly as user trust is compromised due to the disparity between claimed and actual security practices.

Potential impact of CVE-2025-47729

  1. Data Breach Risk: The cleartext storage of messages poses a serious threat, as it could allow unauthorized individuals to access and exploit sensitive communications, leading to potential information leaks and misuse.

  2. Loss of User Trust: Users expect secure communication channels, especially in corporate environments. This vulnerability might erode confidence in the reliability and security of the TeleMessage platform, potentially driving users to seek alternative solutions.

  3. Regulatory Compliance Issues: Organizations may face legal repercussions if they fail to protect sensitive data adequately, particularly in industries governed by strict data protection regulations. The exposure of unencrypted messages could result in violations of such laws, leading to fines or reputational damage.

CISA has reported CVE-2025-47729

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2025-47729 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace

The CISA's recommendation is: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Affected Version(s)

archiving backend 0 <= 2025-05-05

News Articles

CISA Warns of Flaw in TeleMessage App Used by Ex-National Security Advisor 

An information exposure flaw in TeleMessage has been added to CISA’s Known Exploited Vulnerabilities catalog. 

5 days ago

References

EPSS Score

6% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
4.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • 📈

    Vulnerability started trending

  • 📰

    First article discovered by SecurityWeek

  • 👾

    Exploit known to exist

  • 🦅

    CISA Reported

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-47729 : Cleartext Message Exposure in TeleMessage Archiving Backend