Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15455: Improper Authentication in bg5sbk MiniCMS

0
Medium
VulnerabilityCVE-2025-15455cvecve-2025-15455
Published: Mon Jan 05 2026 (01/05/2026, 03:32:06 UTC)
Source: CVE Database V5
Vendor/Project: bg5sbk
Product: MiniCMS

Description

A flaw has been found in bg5sbk MiniCMS up to 1.8. Impacted is the function delete_page of the file /minicms/mc-admin/page.php of the component File Recovery Request Handler. This manipulation causes improper authentication. The attack is possible to be carried out remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/12/2026, 21:27:38 UTC

Technical Analysis

CVE-2025-15455 is an authentication bypass vulnerability affecting the bg5sbk MiniCMS product, specifically versions 1.0 through 1.8. The vulnerability resides in the delete_page function within the /minicms/mc-admin/page.php file, part of the File Recovery Request Handler component. Due to improper authentication checks, remote attackers can invoke this function without any credentials, allowing them to delete pages arbitrarily. This flaw does not require any privileges, user interaction, or prior authentication, making it remotely exploitable over the network with low complexity. The vulnerability impacts the integrity and availability of the CMS content by enabling unauthorized deletion of pages, potentially disrupting website operations or causing data loss. Although an exploit has been published publicly, there are no confirmed reports of active exploitation in the wild. The vendor was notified early but has not issued any patches or advisories, leaving users exposed. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no authentication or user interaction required, and partial impact on integrity and availability. This vulnerability is critical for organizations relying on MiniCMS for content management, especially those with public-facing websites where unauthorized page deletion could cause reputational damage or operational disruption.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized deletion of web content managed by MiniCMS, resulting in website defacement, loss of critical information, or service disruption. This can affect business continuity, customer trust, and regulatory compliance, especially for sectors requiring data integrity such as finance, healthcare, and government. The lack of authentication requirement means attackers can exploit the vulnerability remotely without insider access, increasing the attack surface. If exploited, attackers could also use the deletion capability as a foothold for further attacks or to cover tracks by removing audit trails. The absence of vendor response and patches increases the risk exposure duration. Organizations using MiniCMS in critical infrastructure or public services may face reputational damage and operational downtime. Additionally, the exploit's public availability raises the likelihood of opportunistic attacks targeting vulnerable European entities.

Mitigation Recommendations

Given the lack of official patches, European organizations should implement immediate compensating controls. These include restricting network access to the MiniCMS admin interface via firewalls or VPNs to trusted IP addresses only. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the delete_page function or related endpoints. Regularly back up CMS content and implement integrity monitoring to quickly detect unauthorized deletions. Consider isolating MiniCMS instances from critical networks and applying strict access controls. If feasible, migrate to alternative CMS platforms with active security support. Monitor threat intelligence feeds for any new exploit variants or vendor patches. Conduct internal penetration testing to verify the vulnerability and effectiveness of mitigations. Finally, maintain detailed logs and prepare incident response plans to respond rapidly if exploitation is detected.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-04T10:27:32.057Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695b3722db813ff03e2e334c

Added to database: 1/5/2026, 3:59:30 AM

Last enriched: 1/12/2026, 9:27:38 PM

Last updated: 2/7/2026, 9:13:01 AM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats