Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34467: CWE-667 Improper Locking in fredtempez ZwiiCMS

0
Medium
VulnerabilityCVE-2025-34467cvecve-2025-34467cwe-667cwe-863
Published: Wed Dec 31 2025 (12/31/2025, 18:39:35 UTC)
Source: CVE Database V5
Vendor/Project: fredtempez
Product: ZwiiCMS

Description

ZwiiCMS versions prior to 13.7.00 contain a denial-of-service vulnerability in multiple administrative endpoints due to improper authorization checks combined with flawed resource state management. When an authenticated low-privilege user requests an administrative page, the application returns "404 Not Found" as expected, but incorrectly acquires and associates a temporary lock on the targeted resource with the attacker session prior to authorization. This lock prevents other users, including administrators, from accessing the affected functionality until the attacker navigates away or the session is terminated.

AI-Powered Analysis

AILast updated: 01/07/2026, 23:10:03 UTC

Technical Analysis

CVE-2025-34467 affects ZwiiCMS, a content management system developed by fredtempez, in versions prior to 13.7.00. The vulnerability is categorized under CWE-667 (Improper Locking) and CWE-863 (Incorrect Authorization). It stems from a flawed implementation where, upon an authenticated low-privilege user requesting an administrative endpoint, the system correctly denies access by returning a 404 Not Found response but erroneously acquires a temporary lock on the targeted resource. This lock is associated with the attacker's session and prevents other users, including administrators, from accessing the locked administrative functionality. The locking mechanism is triggered before proper authorization checks are completed, leading to a denial-of-service condition. The vulnerability requires the attacker to be authenticated with low privileges but does not require user interaction beyond the initial request. The CVSS 4.0 base score is 5.3 (medium severity), reflecting network attack vector, low complexity, no privileges required beyond low-level authentication, no user interaction, and limited impact on availability (denial of access to specific administrative functions). No patches or known exploits are currently reported, but the vulnerability could be weaponized to disrupt administrative operations by locking critical CMS resources. The flaw highlights the importance of correct authorization sequencing and resource state management in web applications, especially in administrative contexts.

Potential Impact

For European organizations using ZwiiCMS, this vulnerability could cause significant disruption to web content management and administrative workflows. By denying administrators access to key CMS functions, attackers can effectively halt content updates, configuration changes, or security management tasks, potentially delaying incident response or compliance activities. This denial-of-service condition does not directly compromise confidentiality or integrity but impacts availability of administrative resources. Organizations relying heavily on ZwiiCMS for public-facing websites or internal portals may experience operational downtime or degraded service quality. The impact is particularly critical for sectors with stringent uptime requirements such as government, finance, healthcare, and media. Additionally, the inability to access administrative functions could delay patching or mitigation of other vulnerabilities, compounding security risks. Although exploitation requires authenticated access, many organizations have low-privilege user accounts for contractors, partners, or internal users, which could be leveraged by malicious insiders or compromised accounts. The lack of known exploits suggests limited current threat activity, but the vulnerability should be addressed proactively to prevent potential abuse.

Mitigation Recommendations

1. Apply patches or updates from fredtempez as soon as they become available for ZwiiCMS version 13.7.00 or later, which should correct the improper locking and authorization logic. 2. In the interim, restrict low-privilege user access to administrative endpoints through network segmentation, firewall rules, or web application firewall (WAF) policies to reduce exposure. 3. Implement monitoring and alerting for unusual access patterns to administrative URLs, especially repeated 404 responses combined with session activity that may indicate locking attempts. 4. Review and tighten authentication and authorization policies to ensure that low-privilege users cannot access or trigger administrative resource locks. 5. Consider session management improvements such as limiting concurrent sessions or automatic session termination on suspicious activity. 6. Conduct security audits and code reviews focusing on resource locking and authorization sequencing to identify similar flaws. 7. Educate administrators and users about the risk of denial-of-service through resource locking and encourage prompt reporting of access issues. 8. If possible, temporarily disable or limit access to vulnerable administrative endpoints until a patch is applied. These measures go beyond generic advice by focusing on access control hardening, monitoring for specific attack behaviors, and proactive session management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.606Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6955a05adb813ff03e045d71

Added to database: 12/31/2025, 10:14:50 PM

Last enriched: 1/7/2026, 11:10:03 PM

Last updated: 1/8/2026, 7:21:02 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats