PatchSiren cyber security CVE debrief
CVE-2025-13084 Opto 22 CVE debrief
CVE-2025-13084 is a high-severity information exposure issue in Opto 22 groov View. According to the CISA advisory, the groov View API users endpoint can return a list of all users and associated metadata, including API keys. The endpoint requires an Editor role, but it can reveal API keys for all users, including Administrators. Opto 22 has released a fix and recommends upgrading affected systems.
- Vendor
- Opto 22
- Product
- groov View Server for Windows
- CVSS
- HIGH 7.6
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-11-25
- Original CVE updated
- 2025-11-25
- Advisory published
- 2025-11-25
- Advisory updated
- 2025-11-25
Who should care
Organizations running Opto 22 groov View Server for Windows or GRV-EPIC firmware, especially teams with Editor-role users, administrators, or exposed industrial control system management interfaces.
Technical summary
The advisory describes a users endpoint in the groov View API that discloses user records and associated metadata, including API keys. Access to the endpoint is gated by the Editor role, but successful access can expose keys for all users, including Administrator accounts. The supplied CVSS vector indicates network attackability with low attack complexity, low required privileges, no user interaction, and high confidentiality impact.
Defensive priority
High. This vulnerability can expose privileged API keys and should be addressed promptly wherever groov View is deployed, especially in environments that rely on API keys for administrative or operational access.
Recommended defensive actions
- Upgrade groov View Server for Windows to Version R4.5e.
- Upgrade GRV-EPIC Firmware to Version 4.0.3.
- Review which accounts have the Editor role and limit that role to the smallest necessary set of users.
- Rotate or revoke any API keys that may have been exposed through the endpoint.
- Audit logs and access records for unexpected use of the users endpoint or related administrative activity.
- Validate that affected systems are reachable only from trusted management networks and follow CISA industrial control systems defensive guidance.
Evidence notes
All core claims are taken from the CISA CSAF advisory and its remediation entry. The advisory states that the groov View API users endpoint returns user metadata including API keys and that it requires an Editor role. The remediation section states Opto 22 published a patch and recommends upgrading to groov View Server for Windows Version R4.5e and GRV-EPIC Firmware Version 4.0.3. No exploit steps or unsupported details are included.
Official resources
-
CVE-2025-13084 CVE record
CVE.org
-
CVE-2025-13084 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
CISA published the advisory on 2025-11-25 with the initial revision recorded the same day. The advisory identifies Opto 22 as the vendor and states that a vendor patch is available.