Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60449: n/a

0
Medium
VulnerabilityCVE-2025-60449cvecve-2025-60449
Published: Fri Oct 03 2025 (10/03/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An information disclosure vulnerability has been discovered in SeaCMS 13.1. The vulnerability exists in the admin_safe.php component located in the /btcoan/ directory. This security flaw allows authenticated administrators to scan and download not only the application’s source code but also potentially any file accessible on the server’s root directory.

AI-Powered Analysis

AILast updated: 10/03/2025, 14:07:43 UTC

Technical Analysis

CVE-2025-60449 is an information disclosure vulnerability identified in SeaCMS version 13.1, specifically within the admin_safe.php component located in the /btcoan/ directory. This vulnerability allows an authenticated administrator user to exploit the system to scan and download not only the source code of the SeaCMS application but also potentially any file accessible from the server's root directory. The flaw arises due to insufficient access controls or improper validation in the admin_safe.php script, which fails to restrict file access to authorized or intended files only. As a result, an attacker with valid administrator credentials can leverage this vulnerability to exfiltrate sensitive files, including configuration files, credentials, private keys, or other critical data stored on the server. Although exploitation requires authentication, the impact is significant because it can lead to exposure of sensitive information that could facilitate further attacks, such as privilege escalation, lateral movement, or full system compromise. No CVSS score has been assigned yet, and there are no known public exploits in the wild at the time of publication. However, the vulnerability poses a serious risk due to the breadth of accessible data and the privileged access required to exploit it.

Potential Impact

For European organizations using SeaCMS 13.1, this vulnerability presents a substantial risk to confidentiality and potentially integrity of their web infrastructure. Exposure of source code and server files could reveal business logic, security mechanisms, and sensitive credentials, enabling attackers to craft targeted attacks or pivot within the network. Organizations handling sensitive or regulated data (e.g., personal data under GDPR) could face compliance violations and reputational damage if such data is exposed. The requirement for administrator authentication limits the attack surface to insiders or attackers who have already compromised administrator credentials, but this does not diminish the severity since insider threats and credential theft are common attack vectors. The vulnerability could also facilitate further exploitation, such as deploying malware or ransomware, if attackers gain deeper insight into the system. European entities relying on SeaCMS for content management, especially in sectors like government, finance, healthcare, or critical infrastructure, could be particularly impacted due to the sensitivity of their data and the regulatory environment.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately audit their SeaCMS installations to identify if version 13.1 is in use and whether the admin_safe.php component is accessible. Since no official patch or update is currently available, organizations should implement the following specific measures: 1) Restrict access to the /btcoan/ directory and admin_safe.php script using web server configuration (e.g., IP whitelisting, authentication hardening) to limit exposure only to trusted administrators. 2) Enforce strong multi-factor authentication (MFA) for all administrator accounts to reduce the risk of credential compromise. 3) Conduct thorough monitoring and logging of all administrative access and file download activities to detect suspicious behavior promptly. 4) Review and harden file permissions on the server to ensure that only necessary files are accessible by the web application user, minimizing the scope of files that can be read or downloaded. 5) Consider deploying web application firewalls (WAFs) with custom rules to detect and block abnormal requests targeting admin_safe.php. 6) Engage with SeaCMS vendors or community to track the release of official patches or updates addressing this vulnerability and plan for timely deployment. 7) Perform regular security assessments and penetration testing focusing on authenticated administrator functionalities to identify similar risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68dfd89ea59dbcde03c0fdca

Added to database: 10/3/2025, 2:07:26 PM

Last enriched: 10/3/2025, 2:07:43 PM

Last updated: 10/7/2025, 11:31:15 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats