Signal App Clone ‘TeleMessage’ Vulnerability Exploit Could Expose Passwords

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer

A recently disclosed vulnerability, CVE-2025-48927, affects TeleMessageTM SGNL, a Signal-based messaging app clone. It exposes sensitive user data like passwords and usernames by leaving the /heapdump endpoint accessible without authentication. 

The Vulnerability Explained  

CVE-2025-48927 stems from an outdated configuration in Spring Boot Actuator, where a diagnostic endpoint inadvertently allows access to heap memory dumps. These dumps—often exceeding 150 MB—may contain plaintext usernames, passwords, and other critical credentials. 

Despite new versions of Spring Boot disabling this risky endpoint by default, TeleMessage implementations retained the vulnerable setting until at least May 2025.  

The exposure of the /heapdump endpoint in TeleMessageâ„¢ SGNL reflects a broader trend in cloud service vulnerabilities, such as the RCE flaw in Oracle Cloud Shell recently disclosed by Tenable, where unprotected internal interfaces left critical data accessible without authentication.

Exploitation Attempts  

Cyber threat detection platform GreyNoise identified 11 active IPs attempting direct exploitation of CVE-2025-48927, with significant reconnaissance activity recorded, as reported by GreyNoise recently. 

Over 2,000 IPs have been scanned for Spring Boot Actuator endpoints in the past three months, indicating widespread efforts to locate and exploit vulnerable systems, while almost 1,600 IPs specifically targeted the /health endpoints, which usually detect internet-exposed Spring Boot deployments.

Notably, malicious actors are using these scans strategically to identify unprotected environments hosting TeleMessageTM SGNL.  

Mitigation Strategies  

To neutralize this growing threat, organizations using vulnerable versions of TeleMessage or Spring Boot must take immediate action.  

Tenable’s disclosure of a remote code execution flaw in Oracle’s Cloud Shell shares an architectural weakness with the SGNL heapdump exposure; both stem from diagnostic interfaces intended for internal use, but left publicly reachable.

In May, a hacker breached TeleMessage, reportedly used by former National Security Adviser Mike Waltz, as well as altered versions of WhatsApp, Telegram, and WeChat. 

DarkCrystal RAT targeted Ukrainian Defense employees through Signal in March, and hackers impersonating Marco Rubio with AI via Signal targeted foreign and US politicians.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: