Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34467: CWE-667 Improper Locking in fredtempez ZwiiCMS

0
Medium
VulnerabilityCVE-2025-34467cvecve-2025-34467cwe-667cwe-863
Published: Wed Dec 31 2025 (12/31/2025, 18:39:35 UTC)
Source: CVE Database V5
Vendor/Project: fredtempez
Product: ZwiiCMS

Description

ZwiiCMS versions prior to 13.7.00 contain a denial-of-service vulnerability in multiple administrative endpoints due to improper authorization checks combined with flawed resource state management. When an authenticated low-privilege user requests an administrative page, the application returns "404 Not Found" as expected, but incorrectly acquires and associates a temporary lock on the targeted resource with the attacker session prior to authorization. This lock prevents other users, including administrators, from accessing the affected functionality until the attacker navigates away or the session is terminated.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 14:07:08 UTC

Technical Analysis

CVE-2025-34467 affects ZwiiCMS, an open-source content management system developed by fredtempez, in versions prior to 13.7.00. The vulnerability stems from a combination of improper authorization checks and flawed resource state management, specifically improper locking (CWE-667) and authorization bypass (CWE-863). When an authenticated user with low privileges requests access to certain administrative endpoints, the application correctly returns a 404 Not Found response to conceal the resource’s existence. However, before completing authorization, the system mistakenly acquires and associates a temporary lock on the requested resource with the attacker’s session. This lock prevents other users, including administrators, from accessing the locked resource or functionality until the attacker navigates away or the session terminates. The flaw arises because the locking mechanism is triggered prior to verifying user permissions, causing resource state to be improperly managed. The vulnerability does not require user interaction beyond the initial request and does not require elevated privileges beyond low-level authentication, making it relatively easy to exploit. The CVSS 4.0 base score is 5.3 (medium severity), reflecting network attack vector, low privileges required, no user interaction, and limited impact confined to availability (denial of service). No patches or exploits are currently publicly known, but the vulnerability can disrupt administrative operations by denying access to critical CMS functions. This could impact site management, content updates, and security administration.

Potential Impact

The primary impact of CVE-2025-34467 is denial of service against administrative functionality within ZwiiCMS. Attackers with low-level authenticated access can lock critical administrative resources, preventing legitimate administrators from managing the CMS. This can delay or block content updates, security patches, and configuration changes, potentially leading to prolonged exposure to other vulnerabilities or operational disruptions. In environments where ZwiiCMS is used for high-profile or sensitive websites, this could degrade service availability and administrative control, indirectly impacting confidentiality and integrity if timely security management is hindered. Although the vulnerability does not allow privilege escalation or direct data compromise, the denial of administrative access can have cascading effects on organizational security posture and operational continuity. The ease of exploitation combined with the potential to disrupt administrative workflows makes this a significant concern for organizations relying on ZwiiCMS for content management.

Mitigation Recommendations

To mitigate CVE-2025-34467, organizations should: 1) Upgrade ZwiiCMS to version 13.7.00 or later once a patch is released that corrects the improper locking and authorization logic. 2) Until a patch is available, restrict low-privilege authenticated user access to administrative endpoints via network-level controls such as web application firewalls (WAFs) or reverse proxies that enforce strict access control policies. 3) Implement session management monitoring to detect and terminate suspicious sessions that may be holding locks on administrative resources. 4) Review and harden authorization logic in custom ZwiiCMS extensions or plugins to ensure resource locking occurs only after successful authorization. 5) Monitor administrative endpoint availability and set alerts for unusual denial-of-service patterns that could indicate exploitation attempts. 6) Educate administrators to log out promptly when not actively managing the CMS to reduce lock persistence. These targeted mitigations go beyond generic advice by focusing on controlling access to vulnerable endpoints, monitoring session behavior, and ensuring proper authorization sequencing in resource locking.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.606Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6955a05adb813ff03e045d71

Added to database: 12/31/2025, 10:14:50 PM

Last enriched: 3/5/2026, 2:07:08 PM

Last updated: 3/25/2026, 3:03:54 AM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses