Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15455: Improper Authentication in bg5sbk MiniCMS

0
Medium
VulnerabilityCVE-2025-15455cvecve-2025-15455
Published: Mon Jan 05 2026 (01/05/2026, 03:32:06 UTC)
Source: CVE Database V5
Vendor/Project: bg5sbk
Product: MiniCMS

Description

A flaw has been found in bg5sbk MiniCMS up to 1.8. Impacted is the function delete_page of the file /minicms/mc-admin/page.php of the component File Recovery Request Handler. This manipulation causes improper authentication. The attack is possible to be carried out remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/05/2026, 04:13:52 UTC

Technical Analysis

CVE-2025-15455 identifies a security vulnerability in the bg5sbk MiniCMS content management system, specifically versions 1.0 through 1.8. The flaw exists in the delete_page function located in the /minicms/mc-admin/page.php file, part of the File Recovery Request Handler component. The vulnerability is due to improper authentication checks, allowing remote attackers to invoke the delete_page function without valid credentials or user interaction. This means an attacker can remotely delete pages from the CMS without logging in or any prior authentication, potentially causing unauthorized content removal or website defacement. The vulnerability is remotely exploitable over the network with low attack complexity and no privileges required. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the lack of authentication and ease of exploitation but limited to integrity and availability impacts without confidentiality loss. The vendor was contacted early but has not issued any patches or advisories, and no official fixes are available at this time. An exploit has been published publicly, increasing the risk of exploitation, although no active exploitation in the wild has been reported yet. This vulnerability could be leveraged by attackers to disrupt website operations, damage reputation, or prepare for further attacks by removing critical content or administrative pages. Organizations using MiniCMS should be aware of this risk and implement immediate mitigations to prevent unauthorized deletions.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity and availability of web content managed by MiniCMS. Unauthorized deletion of pages can lead to service disruption, loss of critical information, and reputational damage, especially for public-facing websites or those providing essential services. Organizations in sectors such as government, education, media, and small-to-medium enterprises that rely on MiniCMS for content management could face operational interruptions. The lack of authentication requirement and remote exploitability increase the likelihood of attacks, potentially leading to defacement or denial of service. While confidentiality is not directly impacted, the integrity and availability consequences can affect trust and compliance with data protection regulations like GDPR if service disruptions impact user data access or service continuity. Additionally, the absence of vendor response and patches means organizations must rely on internal controls and monitoring to mitigate risks. The medium severity score suggests a significant but not critical threat, yet the public availability of exploits elevates urgency for European entities to act promptly.

Mitigation Recommendations

Since no official patches or vendor responses are available, European organizations should implement compensating controls immediately. These include restricting access to the /minicms/mc-admin/page.php file and the delete_page function via network-level controls such as IP whitelisting or firewall rules to limit access to trusted administrators only. Employ web application firewalls (WAFs) with custom rules to detect and block unauthorized delete_page requests. Conduct thorough logging and monitoring of CMS administrative actions to detect suspicious deletion attempts. Consider isolating MiniCMS instances from the public internet or placing them behind VPNs or secure gateways requiring strong authentication. Regularly back up CMS content to enable rapid restoration in case of unauthorized deletions. Organizations should also monitor threat intelligence feeds for any updates or patches from the vendor or community. If feasible, evaluate alternative CMS platforms with active security support. Finally, educate administrators about the vulnerability and the importance of immediate mitigation steps to reduce risk exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-04T10:27:32.057Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695b3722db813ff03e2e334c

Added to database: 1/5/2026, 3:59:30 AM

Last enriched: 1/5/2026, 4:13:52 AM

Last updated: 1/7/2026, 4:46:50 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats