CVE-2025-11272: Improper Authorization in SeriaWei ZKEACMS
A vulnerability has been found in SeriaWei ZKEACMS up to 4.3. This affects the function Delete of the file src/ZKEACMS.Redirection/Controllers/UrlRedirectionController.cs of the component POST Request Handler. The manipulation leads to improper authorization. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-11272 is a medium-severity vulnerability affecting SeriaWei's ZKEACMS content management system versions 4.0 through 4.3. The flaw resides in the Delete function within the UrlRedirectionController.cs file, specifically in the POST request handler component. The vulnerability is due to improper authorization checks, allowing an attacker to remotely invoke the Delete function without sufficient privileges. This means an attacker with network access can potentially delete URL redirections or related resources managed by the CMS without proper authentication or authorization. The vulnerability does not require user interaction and can be exploited remotely with low attack complexity, though it requires some level of privileges (PR:L) indicating that the attacker must have limited privileges or be authenticated with a low-level account. The impact on confidentiality is none, but integrity and availability are impacted to a limited extent, as unauthorized deletion could disrupt URL redirection functionality, potentially causing denial of service or misdirection of users. The vendor was contacted but did not respond, and no patches or mitigations have been publicly released yet. While no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation.
Potential Impact
For European organizations using ZKEACMS versions 4.0 to 4.3, this vulnerability poses a risk primarily to the integrity and availability of web services relying on URL redirection managed by the CMS. Attackers exploiting this flaw could delete critical URL redirections, leading to broken links, service disruptions, or potential redirection to malicious sites if combined with other vulnerabilities. This could affect customer trust, cause operational downtime, and potentially impact business continuity. Organizations in sectors with high reliance on web presence, such as e-commerce, government portals, and media, may experience reputational damage and loss of revenue. Since the vulnerability requires some level of privilege, insider threats or compromised low-privilege accounts could be leveraged to exploit this flaw. The lack of vendor response and absence of patches increases the urgency for organizations to implement compensating controls. Given the remote exploitability and no user interaction needed, the threat could be leveraged in automated attacks targeting vulnerable installations.
Mitigation Recommendations
1. Immediate mitigation should include restricting network access to the ZKEACMS administrative interfaces to trusted IP addresses only, minimizing exposure to remote attackers. 2. Implement strict access control policies and monitor for unusual deletion requests or URL redirection changes in logs. 3. Employ Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized POST requests to the vulnerable Delete endpoint. 4. Conduct a thorough audit of user privileges and remove or limit low-privilege accounts that have access to the URL redirection management functions. 5. If possible, temporarily disable the URL redirection deletion functionality or replace it with manual processes until a patch is available. 6. Monitor threat intelligence sources for any emerging exploits and vendor updates. 7. Consider deploying intrusion detection systems (IDS) to alert on suspicious activity related to the CMS. 8. Plan for an upgrade or patch deployment once the vendor releases a fix or consider migrating to alternative CMS platforms with active security support.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-11272: Improper Authorization in SeriaWei ZKEACMS
Description
A vulnerability has been found in SeriaWei ZKEACMS up to 4.3. This affects the function Delete of the file src/ZKEACMS.Redirection/Controllers/UrlRedirectionController.cs of the component POST Request Handler. The manipulation leads to improper authorization. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-11272 is a medium-severity vulnerability affecting SeriaWei's ZKEACMS content management system versions 4.0 through 4.3. The flaw resides in the Delete function within the UrlRedirectionController.cs file, specifically in the POST request handler component. The vulnerability is due to improper authorization checks, allowing an attacker to remotely invoke the Delete function without sufficient privileges. This means an attacker with network access can potentially delete URL redirections or related resources managed by the CMS without proper authentication or authorization. The vulnerability does not require user interaction and can be exploited remotely with low attack complexity, though it requires some level of privileges (PR:L) indicating that the attacker must have limited privileges or be authenticated with a low-level account. The impact on confidentiality is none, but integrity and availability are impacted to a limited extent, as unauthorized deletion could disrupt URL redirection functionality, potentially causing denial of service or misdirection of users. The vendor was contacted but did not respond, and no patches or mitigations have been publicly released yet. While no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation.
Potential Impact
For European organizations using ZKEACMS versions 4.0 to 4.3, this vulnerability poses a risk primarily to the integrity and availability of web services relying on URL redirection managed by the CMS. Attackers exploiting this flaw could delete critical URL redirections, leading to broken links, service disruptions, or potential redirection to malicious sites if combined with other vulnerabilities. This could affect customer trust, cause operational downtime, and potentially impact business continuity. Organizations in sectors with high reliance on web presence, such as e-commerce, government portals, and media, may experience reputational damage and loss of revenue. Since the vulnerability requires some level of privilege, insider threats or compromised low-privilege accounts could be leveraged to exploit this flaw. The lack of vendor response and absence of patches increases the urgency for organizations to implement compensating controls. Given the remote exploitability and no user interaction needed, the threat could be leveraged in automated attacks targeting vulnerable installations.
Mitigation Recommendations
1. Immediate mitigation should include restricting network access to the ZKEACMS administrative interfaces to trusted IP addresses only, minimizing exposure to remote attackers. 2. Implement strict access control policies and monitor for unusual deletion requests or URL redirection changes in logs. 3. Employ Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized POST requests to the vulnerable Delete endpoint. 4. Conduct a thorough audit of user privileges and remove or limit low-privilege accounts that have access to the URL redirection management functions. 5. If possible, temporarily disable the URL redirection deletion functionality or replace it with manual processes until a patch is available. 6. Monitor threat intelligence sources for any emerging exploits and vendor updates. 7. Consider deploying intrusion detection systems (IDS) to alert on suspicious activity related to the CMS. 8. Plan for an upgrade or patch deployment once the vendor releases a fix or consider migrating to alternative CMS platforms with active security support.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-04T05:56:51.264Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e180348ab2c50a2d2f9909
Added to database: 10/4/2025, 8:14:44 PM
Last enriched: 10/4/2025, 8:18:41 PM
Last updated: 10/7/2025, 1:03:53 PM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40886: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
HighCVE-2025-40885: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.