Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53897: CWE-352: Cross-Site Request Forgery (CSRF) in kiteworks security-advisories

0
Medium
VulnerabilityCVE-2025-53897cvecve-2025-53897cwe-352
Published: Sat Nov 29 2025 (11/29/2025, 02:24:36 UTC)
Source: CVE Database V5
Vendor/Project: kiteworks
Product: security-advisories

Description

Kiteworks MFT orchestrates end-to-end file transfer workflows. Prior to version 9.1.0, this vulnerability could allow an external attacker to gain access to log information from the system by tricking an administrator into browsing a specifically crafted fake page of Kiteworks MFT. This issue has been patched in version 9.1.0.

AI-Powered Analysis

AILast updated: 12/06/2025, 04:31:31 UTC

Technical Analysis

CVE-2025-53897 is a Cross-Site Request Forgery (CSRF) vulnerability identified in Kiteworks Managed File Transfer (MFT) software, specifically affecting versions prior to 9.1.0. Kiteworks MFT is used to orchestrate end-to-end file transfer workflows, often in environments requiring secure and compliant data handling. The vulnerability arises because the application does not adequately verify the authenticity of requests made by authenticated administrators. An attacker can exploit this by crafting a malicious web page that, when visited by an administrator, triggers unauthorized actions within the Kiteworks MFT system. Specifically, this exploit allows the attacker to gain access to sensitive log information, which may contain details about system operations, user activities, or other confidential data. The attack vector requires the administrator to interact with the malicious page, making user interaction necessary. The vulnerability impacts confidentiality and integrity but does not disrupt system availability. The CVSS 3.1 base score is 6.8, reflecting a medium severity level due to the network attack vector, high impact on confidentiality and integrity, but requiring user interaction and high attack complexity. The issue was publicly disclosed on November 29, 2025, and has been addressed in Kiteworks MFT version 9.1.0. No known exploits are currently reported in the wild, but the potential for sensitive data exposure makes timely patching critical. This vulnerability is categorized under CWE-352, which covers CSRF attacks that exploit trust in a user's browser to perform unauthorized actions.

Potential Impact

For European organizations, the impact of CVE-2025-53897 can be significant, especially in sectors handling sensitive or regulated data such as finance, healthcare, government, and critical infrastructure. Unauthorized access to log information can lead to exposure of operational details, user activities, and potentially sensitive metadata that could facilitate further attacks or compliance violations under regulations like GDPR. The confidentiality breach could undermine trust and lead to reputational damage. Since Kiteworks MFT is used for secure file transfer workflows, any compromise in its integrity or confidentiality could disrupt business processes or lead to data leakage. Although availability is not affected, the indirect consequences of data exposure and potential regulatory penalties could be costly. The requirement for administrator interaction limits the attack scope but does not eliminate risk, particularly in environments where administrators may be targeted via phishing or social engineering. Organizations relying on Kiteworks MFT must consider this vulnerability a priority to mitigate risks associated with unauthorized data disclosure.

Mitigation Recommendations

European organizations should immediately verify the version of Kiteworks MFT in use and upgrade to version 9.1.0 or later, where the vulnerability is patched. Beyond patching, organizations should implement strict administrative access controls and reduce the attack surface by limiting administrator web access to trusted networks or VPNs. Employing multi-factor authentication (MFA) for administrator accounts can reduce the risk of credential compromise. Security awareness training focused on phishing and social engineering can help prevent administrators from interacting with malicious pages. Additionally, organizations should monitor logs for unusual access patterns or attempts to access log information unexpectedly. Implementing Content Security Policy (CSP) headers and SameSite cookie attributes can help mitigate CSRF risks by restricting cross-origin requests. Regular security assessments and penetration testing should include checks for CSRF vulnerabilities. Finally, segregating duties and limiting log access to only necessary personnel can reduce the impact if an exploit occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-07-11T19:05:23.825Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692a5c732a13ea799fd8c851

Added to database: 11/29/2025, 2:37:39 AM

Last enriched: 12/6/2025, 4:31:31 AM

Last updated: 1/19/2026, 6:59:16 AM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats