CVE-2025-5033: Cross-Site Request Forgery in XiaoBingby TeaCMS
A vulnerability classified as problematic was found in XiaoBingby TeaCMS 2.0.2. Affected by this vulnerability is an unknown functionality of the file src/main/java/me/teacms/controller/admin/UserManageController/addUser. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-5033 is a Cross-Site Request Forgery (CSRF) vulnerability identified in XiaoBingby TeaCMS version 2.0.2, specifically within the UserManageController's addUser functionality. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting a unwanted request to a web application in which they are currently authenticated. In this case, the vulnerability resides in an administrative controller responsible for adding users, which means an attacker could potentially cause an authenticated administrator to unknowingly add new users without their consent. The vulnerability is exploitable remotely and does not require prior authentication or privileges, although it does require user interaction (the victim must visit a maliciously crafted webpage). The CVSS 4.0 base score is 5.3 (medium severity), reflecting the fact that the attack vector is network-based, with low attack complexity, no privileges required, but user interaction is necessary. The impact on confidentiality is none, integrity is low (due to unauthorized user addition), and availability is none. No known exploits are currently observed in the wild, and no patches have been linked yet. The vulnerability disclosure is recent (May 21, 2025), and the exploit details have been made public, increasing the risk of exploitation. Given that TeaCMS is a content management system, the addition of unauthorized users could lead to privilege escalation or further compromise if those users gain administrative rights or access sensitive content.
Potential Impact
For European organizations using TeaCMS 2.0.2, this vulnerability poses a moderate risk. Unauthorized user creation could lead to unauthorized access, privilege escalation, and potential data manipulation or leakage if the newly created users have elevated permissions. This could compromise the integrity of organizational data and content managed by TeaCMS. Since the attack requires user interaction, phishing or social engineering campaigns targeting administrators are likely attack vectors. The impact is particularly significant for organizations relying on TeaCMS for critical content management, such as government agencies, educational institutions, and enterprises with sensitive information. The lack of confidentiality impact reduces the risk of direct data leaks, but integrity violations and potential misuse of added accounts could disrupt operations and trust. The medium severity rating suggests that while the vulnerability is not critical, it should be addressed promptly to prevent exploitation, especially in environments with high-value targets or regulatory compliance requirements like GDPR.
Mitigation Recommendations
1. Immediate mitigation should include implementing CSRF protection mechanisms such as anti-CSRF tokens in all state-changing requests, especially in the addUser functionality. 2. Administrators should be educated and warned about phishing and social engineering risks to avoid inadvertent interaction with malicious links. 3. Restrict administrative access to the TeaCMS backend through network-level controls such as VPNs or IP whitelisting to reduce exposure. 4. Monitor user creation logs closely for suspicious or unauthorized account additions. 5. If possible, disable or restrict the addUser functionality temporarily until a vendor patch is available. 6. Apply principle of least privilege to all user roles to minimize damage from unauthorized accounts. 7. Regularly update TeaCMS to the latest version once a patch addressing this vulnerability is released. 8. Employ web application firewalls (WAFs) that can detect and block CSRF attack patterns targeting the CMS.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-5033: Cross-Site Request Forgery in XiaoBingby TeaCMS
Description
A vulnerability classified as problematic was found in XiaoBingby TeaCMS 2.0.2. Affected by this vulnerability is an unknown functionality of the file src/main/java/me/teacms/controller/admin/UserManageController/addUser. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-5033 is a Cross-Site Request Forgery (CSRF) vulnerability identified in XiaoBingby TeaCMS version 2.0.2, specifically within the UserManageController's addUser functionality. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting a unwanted request to a web application in which they are currently authenticated. In this case, the vulnerability resides in an administrative controller responsible for adding users, which means an attacker could potentially cause an authenticated administrator to unknowingly add new users without their consent. The vulnerability is exploitable remotely and does not require prior authentication or privileges, although it does require user interaction (the victim must visit a maliciously crafted webpage). The CVSS 4.0 base score is 5.3 (medium severity), reflecting the fact that the attack vector is network-based, with low attack complexity, no privileges required, but user interaction is necessary. The impact on confidentiality is none, integrity is low (due to unauthorized user addition), and availability is none. No known exploits are currently observed in the wild, and no patches have been linked yet. The vulnerability disclosure is recent (May 21, 2025), and the exploit details have been made public, increasing the risk of exploitation. Given that TeaCMS is a content management system, the addition of unauthorized users could lead to privilege escalation or further compromise if those users gain administrative rights or access sensitive content.
Potential Impact
For European organizations using TeaCMS 2.0.2, this vulnerability poses a moderate risk. Unauthorized user creation could lead to unauthorized access, privilege escalation, and potential data manipulation or leakage if the newly created users have elevated permissions. This could compromise the integrity of organizational data and content managed by TeaCMS. Since the attack requires user interaction, phishing or social engineering campaigns targeting administrators are likely attack vectors. The impact is particularly significant for organizations relying on TeaCMS for critical content management, such as government agencies, educational institutions, and enterprises with sensitive information. The lack of confidentiality impact reduces the risk of direct data leaks, but integrity violations and potential misuse of added accounts could disrupt operations and trust. The medium severity rating suggests that while the vulnerability is not critical, it should be addressed promptly to prevent exploitation, especially in environments with high-value targets or regulatory compliance requirements like GDPR.
Mitigation Recommendations
1. Immediate mitigation should include implementing CSRF protection mechanisms such as anti-CSRF tokens in all state-changing requests, especially in the addUser functionality. 2. Administrators should be educated and warned about phishing and social engineering risks to avoid inadvertent interaction with malicious links. 3. Restrict administrative access to the TeaCMS backend through network-level controls such as VPNs or IP whitelisting to reduce exposure. 4. Monitor user creation logs closely for suspicious or unauthorized account additions. 5. If possible, disable or restrict the addUser functionality temporarily until a vendor patch is available. 6. Apply principle of least privilege to all user roles to minimize damage from unauthorized accounts. 7. Regularly update TeaCMS to the latest version once a patch addressing this vulnerability is released. 8. Employ web application firewalls (WAFs) that can detect and block CSRF attack patterns targeting the CMS.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-21T11:02:07.195Z
- Cisa Enriched
- false
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682e0f74c4522896dcc513de
Added to database: 5/21/2025, 5:37:56 PM
Last enriched: 7/7/2025, 1:12:38 PM
Last updated: 1/7/2026, 4:20:51 AM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.