Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53900: CWE-267: Privilege Defined With Unsafe Actions in kiteworks security-advisories

0
Medium
VulnerabilityCVE-2025-53900cvecve-2025-53900cwe-267
Published: Sat Nov 29 2025 (11/29/2025, 02:25:34 UTC)
Source: CVE Database V5
Vendor/Project: kiteworks
Product: security-advisories

Description

Kiteworks MFT orchestrates end-to-end file transfer workflows. Prior to version 9.1.0, an unfavourable definition of roles and permissions in Kiteworks MFT on managing Connections could lead to unexpected escalation of privileges for authorized users. This issue has been patched in version 9.1.0.

AI-Powered Analysis

AILast updated: 11/29/2025, 03:23:03 UTC

Technical Analysis

CVE-2025-53900 identifies a privilege escalation vulnerability in Kiteworks Managed File Transfer (MFT) software versions before 9.1.0. The root cause is an unsafe definition of roles and permissions, specifically in how the system manages Connections within the application. Connections in Kiteworks MFT represent configurations for file transfer endpoints or protocols. Improperly defined roles allow authorized users with limited privileges to perform actions beyond their intended scope, leading to unexpected privilege escalation. This vulnerability is classified under CWE-267, which concerns privileges defined with unsafe actions. The CVSS v3.1 base score is 6.5 (medium), with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and no availability impact (A:N). Exploiting this flaw could allow an attacker with legitimate access to elevate their permissions and potentially alter connection settings, which could undermine the integrity of file transfer workflows. The vulnerability was publicly disclosed on November 29, 2025, and has been patched in version 9.1.0 of Kiteworks MFT. No known exploits have been reported in the wild, but the risk remains for organizations running vulnerable versions. The issue highlights the importance of secure role and permission management in complex enterprise software handling sensitive data transfers.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the integrity of file transfer workflows managed by Kiteworks MFT. Unauthorized privilege escalation could allow malicious insiders or compromised accounts to alter connection configurations, potentially redirecting or intercepting sensitive data transfers without detection. Although confidentiality and availability are not directly impacted, the integrity breach could lead to data tampering or unauthorized data exposure indirectly. Industries such as finance, healthcare, legal, and government entities that rely on secure and compliant file transfers are particularly vulnerable. The disruption or manipulation of file transfer connections could also lead to compliance violations under GDPR and other data protection regulations, resulting in legal and reputational damage. Since exploitation requires existing privileges, the threat is more relevant to organizations with multiple users managing connections or with complex role assignments. The absence of known exploits reduces immediate risk but does not eliminate the need for urgent remediation given the potential impact.

Mitigation Recommendations

European organizations using Kiteworks MFT should immediately verify their software version and upgrade to version 9.1.0 or later, where the vulnerability is patched. Review and audit role definitions and permissions related to managing Connections to ensure the principle of least privilege is enforced. Implement strict access controls and monitoring on privileged accounts that manage file transfer connections. Employ logging and alerting mechanisms to detect unusual changes to connection configurations. Conduct regular security training for administrators and users with elevated privileges to prevent misuse. If upgrading is not immediately feasible, consider restricting network access to the management interfaces of Kiteworks MFT to trusted IPs only. Additionally, perform periodic security assessments and penetration testing focused on privilege escalation vectors within the file transfer environment. Maintain an incident response plan that includes scenarios involving unauthorized privilege escalation and configuration tampering.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-07-11T19:05:23.826Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692a637a2a13ea799fe08f24

Added to database: 11/29/2025, 3:07:38 AM

Last enriched: 11/29/2025, 3:23:03 AM

Last updated: 11/29/2025, 10:00:13 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats