Cleartext Message Exposure in TeleMessage Archiving Backend
CVE-2025-47729
Key Information:
- Vendor
Telemessage
- Status
- Vendor
- CVE Published:
- 8 May 2025
Badges
What is CVE-2025-47729?
CVE-2025-47729 is a vulnerability found in the TeleMessage archiving backend, specifically affecting the TM SGNL application used for messaging. The flaw allows for the storage of cleartext copies of messages, which contradicts the promises of end-to-end encryption that users expect from the service. By exposing these messages in an unencrypted form, the vulnerability raises significant security concerns, as sensitive communications could be intercepted and misused. Organizations relying on TeleMessage for secure messaging and archiving face an increased risk of data breaches and loss of confidentiality, particularly as user trust is compromised due to the disparity between claimed and actual security practices.
Potential impact of CVE-2025-47729
-
Data Breach Risk: The cleartext storage of messages poses a serious threat, as it could allow unauthorized individuals to access and exploit sensitive communications, leading to potential information leaks and misuse.
-
Loss of User Trust: Users expect secure communication channels, especially in corporate environments. This vulnerability might erode confidence in the reliability and security of the TeleMessage platform, potentially driving users to seek alternative solutions.
-
Regulatory Compliance Issues: Organizations may face legal repercussions if they fail to protect sensitive data adequately, particularly in industries governed by strict data protection regulations. The exposure of unencrypted messages could result in violations of such laws, leading to fines or reputational damage.
CISA has reported CVE-2025-47729
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2025-47729 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace
The CISA's recommendation is: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Affected Version(s)
archiving backend 0 <= 2025-05-05
News Articles
CISA Warns of Flaw in TeleMessage App Used by Ex-National Security Advisor
An information exposure flaw in TeleMessage has been added to CISA’s Known Exploited Vulnerabilities catalog.
5 days ago
References
EPSS Score
6% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 📈
Vulnerability started trending
- 📰
First article discovered by SecurityWeek
- 👾
Exploit known to exist
- 🦅
CISA Reported
Vulnerability published
Vulnerability Reserved