CVE-2025-53897: CWE-352: Cross-Site Request Forgery (CSRF) in kiteworks security-advisories
Kiteworks MFT orchestrates end-to-end file transfer workflows. Prior to version 9.1.0, this vulnerability could allow an external attacker to gain access to log information from the system by tricking an administrator into browsing a specifically crafted fake page of Kiteworks MFT. This issue has been patched in version 9.1.0.
AI Analysis
Technical Summary
CVE-2025-53897 is a Cross-Site Request Forgery (CSRF) vulnerability identified in Kiteworks Managed File Transfer (MFT) software, specifically affecting versions prior to 9.1.0. Kiteworks MFT is used to orchestrate end-to-end file transfer workflows, often in environments requiring secure and compliant data handling. The vulnerability arises because the application does not adequately verify the authenticity of requests made by authenticated administrators. An attacker can exploit this by crafting a malicious web page that, when visited by an administrator, triggers unauthorized actions within the Kiteworks MFT system. Specifically, this exploit allows the attacker to gain access to sensitive log information, which may contain details about system operations, user activities, or other confidential data. The attack vector requires the administrator to interact with the malicious page, making user interaction necessary. The vulnerability impacts confidentiality and integrity but does not disrupt system availability. The CVSS 3.1 base score is 6.8, reflecting a medium severity level due to the network attack vector, high impact on confidentiality and integrity, but requiring user interaction and high attack complexity. The issue was publicly disclosed on November 29, 2025, and has been addressed in Kiteworks MFT version 9.1.0. No known exploits are currently reported in the wild, but the potential for sensitive data exposure makes timely patching critical. This vulnerability is categorized under CWE-352, which covers CSRF attacks that exploit trust in a user's browser to perform unauthorized actions.
Potential Impact
For European organizations, the impact of CVE-2025-53897 can be significant, especially in sectors handling sensitive or regulated data such as finance, healthcare, government, and critical infrastructure. Unauthorized access to log information can lead to exposure of operational details, user activities, and potentially sensitive metadata that could facilitate further attacks or compliance violations under regulations like GDPR. The confidentiality breach could undermine trust and lead to reputational damage. Since Kiteworks MFT is used for secure file transfer workflows, any compromise in its integrity or confidentiality could disrupt business processes or lead to data leakage. Although availability is not affected, the indirect consequences of data exposure and potential regulatory penalties could be costly. The requirement for administrator interaction limits the attack scope but does not eliminate risk, particularly in environments where administrators may be targeted via phishing or social engineering. Organizations relying on Kiteworks MFT must consider this vulnerability a priority to mitigate risks associated with unauthorized data disclosure.
Mitigation Recommendations
European organizations should immediately verify the version of Kiteworks MFT in use and upgrade to version 9.1.0 or later, where the vulnerability is patched. Beyond patching, organizations should implement strict administrative access controls and reduce the attack surface by limiting administrator web access to trusted networks or VPNs. Employing multi-factor authentication (MFA) for administrator accounts can reduce the risk of credential compromise. Security awareness training focused on phishing and social engineering can help prevent administrators from interacting with malicious pages. Additionally, organizations should monitor logs for unusual access patterns or attempts to access log information unexpectedly. Implementing Content Security Policy (CSP) headers and SameSite cookie attributes can help mitigate CSRF risks by restricting cross-origin requests. Regular security assessments and penetration testing should include checks for CSRF vulnerabilities. Finally, segregating duties and limiting log access to only necessary personnel can reduce the impact if an exploit occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-53897: CWE-352: Cross-Site Request Forgery (CSRF) in kiteworks security-advisories
Description
Kiteworks MFT orchestrates end-to-end file transfer workflows. Prior to version 9.1.0, this vulnerability could allow an external attacker to gain access to log information from the system by tricking an administrator into browsing a specifically crafted fake page of Kiteworks MFT. This issue has been patched in version 9.1.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-53897 is a Cross-Site Request Forgery (CSRF) vulnerability identified in Kiteworks Managed File Transfer (MFT) software, specifically affecting versions prior to 9.1.0. Kiteworks MFT is used to orchestrate end-to-end file transfer workflows, often in environments requiring secure and compliant data handling. The vulnerability arises because the application does not adequately verify the authenticity of requests made by authenticated administrators. An attacker can exploit this by crafting a malicious web page that, when visited by an administrator, triggers unauthorized actions within the Kiteworks MFT system. Specifically, this exploit allows the attacker to gain access to sensitive log information, which may contain details about system operations, user activities, or other confidential data. The attack vector requires the administrator to interact with the malicious page, making user interaction necessary. The vulnerability impacts confidentiality and integrity but does not disrupt system availability. The CVSS 3.1 base score is 6.8, reflecting a medium severity level due to the network attack vector, high impact on confidentiality and integrity, but requiring user interaction and high attack complexity. The issue was publicly disclosed on November 29, 2025, and has been addressed in Kiteworks MFT version 9.1.0. No known exploits are currently reported in the wild, but the potential for sensitive data exposure makes timely patching critical. This vulnerability is categorized under CWE-352, which covers CSRF attacks that exploit trust in a user's browser to perform unauthorized actions.
Potential Impact
For European organizations, the impact of CVE-2025-53897 can be significant, especially in sectors handling sensitive or regulated data such as finance, healthcare, government, and critical infrastructure. Unauthorized access to log information can lead to exposure of operational details, user activities, and potentially sensitive metadata that could facilitate further attacks or compliance violations under regulations like GDPR. The confidentiality breach could undermine trust and lead to reputational damage. Since Kiteworks MFT is used for secure file transfer workflows, any compromise in its integrity or confidentiality could disrupt business processes or lead to data leakage. Although availability is not affected, the indirect consequences of data exposure and potential regulatory penalties could be costly. The requirement for administrator interaction limits the attack scope but does not eliminate risk, particularly in environments where administrators may be targeted via phishing or social engineering. Organizations relying on Kiteworks MFT must consider this vulnerability a priority to mitigate risks associated with unauthorized data disclosure.
Mitigation Recommendations
European organizations should immediately verify the version of Kiteworks MFT in use and upgrade to version 9.1.0 or later, where the vulnerability is patched. Beyond patching, organizations should implement strict administrative access controls and reduce the attack surface by limiting administrator web access to trusted networks or VPNs. Employing multi-factor authentication (MFA) for administrator accounts can reduce the risk of credential compromise. Security awareness training focused on phishing and social engineering can help prevent administrators from interacting with malicious pages. Additionally, organizations should monitor logs for unusual access patterns or attempts to access log information unexpectedly. Implementing Content Security Policy (CSP) headers and SameSite cookie attributes can help mitigate CSRF risks by restricting cross-origin requests. Regular security assessments and penetration testing should include checks for CSRF vulnerabilities. Finally, segregating duties and limiting log access to only necessary personnel can reduce the impact if an exploit occurs.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-07-11T19:05:23.825Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692a5c732a13ea799fd8c851
Added to database: 11/29/2025, 2:37:39 AM
Last enriched: 12/6/2025, 4:31:31 AM
Last updated: 1/19/2026, 6:59:16 AM
Views: 47
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1142: Cross-Site Request Forgery in PHPGurukul News Portal
MediumCVE-2026-1141: Improper Authorization in PHPGurukul News Portal
MediumCVE-2026-1140: Buffer Overflow in UTT 进取 520W
HighCVE-2026-1139: Buffer Overflow in UTT 进取 520W
HighCVE-2026-1138: Buffer Overflow in UTT 进取 520W
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.