CVE-2025-65900: n/a
Kalmia CMS version 0.2.0 contains an Incorrect Access Control vulnerability in the /kal-api/auth/users API endpoint. Due to insufficient permission validation and excessive data exposure in the backend, an authenticated user with basic read permissions can retrieve sensitive information for all platform users.
AI Analysis
Technical Summary
CVE-2025-65900 identifies a security vulnerability in Kalmia CMS version 0.2.0, specifically an Incorrect Access Control issue in the /kal-api/auth/users API endpoint. The vulnerability arises because the backend fails to properly validate permissions, allowing an authenticated user with only basic read privileges to access sensitive information about all users on the platform. This excessive data exposure violates the principle of least privilege and can lead to unauthorized disclosure of personal or sensitive user data. The vulnerability is classified under CWE-863 (Incorrect Authorization). The CVSS v3.1 base score is 6.5, indicating a medium severity, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, meaning it is remotely exploitable over the network, requires low attack complexity, requires privileges (authenticated user with read access), no user interaction, unchanged scope, high confidentiality impact, and no impact on integrity or availability. No patches or known exploits are currently available, but the vulnerability poses a significant risk to confidentiality. Organizations using this CMS version should be aware that attackers with basic authenticated access can harvest sensitive user data, potentially leading to privacy violations, compliance issues, and further targeted attacks.
Potential Impact
For European organizations, the primary impact is the unauthorized disclosure of sensitive user information, which can lead to privacy breaches and regulatory non-compliance, especially under GDPR. The exposure of user data can also facilitate social engineering, identity theft, or targeted phishing attacks. Although the vulnerability does not affect system integrity or availability, the confidentiality breach alone can damage organizational reputation and trust. Sectors such as government, healthcare, finance, and critical infrastructure that rely on Kalmia CMS or similar platforms are particularly vulnerable. The medium severity rating reflects that exploitation requires authenticated access, limiting the attack surface to insiders or compromised accounts. However, given the potential volume of exposed data, the impact on European entities handling personal data is significant.
Mitigation Recommendations
1. Immediately audit and restrict access permissions on the /kal-api/auth/users API endpoint to ensure only authorized roles can access sensitive user data. 2. Implement strict backend permission validation to enforce least privilege principles, ensuring users cannot access data beyond their authorization level. 3. Conduct a comprehensive review of all API endpoints for similar access control weaknesses. 4. Monitor logs for unusual or excessive access patterns to user data, which may indicate exploitation attempts. 5. If possible, upgrade or patch Kalmia CMS once a fix is released; until then, consider disabling or restricting the vulnerable API endpoint. 6. Educate users and administrators about the risk of credential compromise, as authenticated access is required for exploitation. 7. Employ network segmentation and multi-factor authentication to reduce the risk of unauthorized authenticated access. 8. Prepare incident response plans focused on data breach scenarios involving user information exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-65900: n/a
Description
Kalmia CMS version 0.2.0 contains an Incorrect Access Control vulnerability in the /kal-api/auth/users API endpoint. Due to insufficient permission validation and excessive data exposure in the backend, an authenticated user with basic read permissions can retrieve sensitive information for all platform users.
AI-Powered Analysis
Technical Analysis
CVE-2025-65900 identifies a security vulnerability in Kalmia CMS version 0.2.0, specifically an Incorrect Access Control issue in the /kal-api/auth/users API endpoint. The vulnerability arises because the backend fails to properly validate permissions, allowing an authenticated user with only basic read privileges to access sensitive information about all users on the platform. This excessive data exposure violates the principle of least privilege and can lead to unauthorized disclosure of personal or sensitive user data. The vulnerability is classified under CWE-863 (Incorrect Authorization). The CVSS v3.1 base score is 6.5, indicating a medium severity, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, meaning it is remotely exploitable over the network, requires low attack complexity, requires privileges (authenticated user with read access), no user interaction, unchanged scope, high confidentiality impact, and no impact on integrity or availability. No patches or known exploits are currently available, but the vulnerability poses a significant risk to confidentiality. Organizations using this CMS version should be aware that attackers with basic authenticated access can harvest sensitive user data, potentially leading to privacy violations, compliance issues, and further targeted attacks.
Potential Impact
For European organizations, the primary impact is the unauthorized disclosure of sensitive user information, which can lead to privacy breaches and regulatory non-compliance, especially under GDPR. The exposure of user data can also facilitate social engineering, identity theft, or targeted phishing attacks. Although the vulnerability does not affect system integrity or availability, the confidentiality breach alone can damage organizational reputation and trust. Sectors such as government, healthcare, finance, and critical infrastructure that rely on Kalmia CMS or similar platforms are particularly vulnerable. The medium severity rating reflects that exploitation requires authenticated access, limiting the attack surface to insiders or compromised accounts. However, given the potential volume of exposed data, the impact on European entities handling personal data is significant.
Mitigation Recommendations
1. Immediately audit and restrict access permissions on the /kal-api/auth/users API endpoint to ensure only authorized roles can access sensitive user data. 2. Implement strict backend permission validation to enforce least privilege principles, ensuring users cannot access data beyond their authorization level. 3. Conduct a comprehensive review of all API endpoints for similar access control weaknesses. 4. Monitor logs for unusual or excessive access patterns to user data, which may indicate exploitation attempts. 5. If possible, upgrade or patch Kalmia CMS once a fix is released; until then, consider disabling or restricting the vulnerable API endpoint. 6. Educate users and administrators about the risk of credential compromise, as authenticated access is required for exploitation. 7. Employ network segmentation and multi-factor authentication to reduce the risk of unauthorized authenticated access. 8. Prepare incident response plans focused on data breach scenarios involving user information exposure.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6931fbea0459f550ec00bb30
Added to database: 12/4/2025, 9:23:54 PM
Last enriched: 12/11/2025, 10:02:15 PM
Last updated: 1/19/2026, 7:55:44 AM
Views: 63
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1144: Use After Free in quickjs-ng quickjs
MediumCVE-2026-1143: Buffer Overflow in TOTOLINK A3700R
HighCVE-2026-1142: Cross-Site Request Forgery in PHPGurukul News Portal
MediumCVE-2026-1141: Improper Authorization in PHPGurukul News Portal
MediumCVE-2026-1140: Buffer Overflow in UTT 进取 520W
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.