Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65900: n/a

0
Medium
VulnerabilityCVE-2025-65900cvecve-2025-65900
Published: Thu Dec 04 2025 (12/04/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Kalmia CMS version 0.2.0 contains an Incorrect Access Control vulnerability in the /kal-api/auth/users API endpoint. Due to insufficient permission validation and excessive data exposure in the backend, an authenticated user with basic read permissions can retrieve sensitive information for all platform users.

AI-Powered Analysis

AILast updated: 12/11/2025, 22:02:15 UTC

Technical Analysis

CVE-2025-65900 identifies a security vulnerability in Kalmia CMS version 0.2.0, specifically an Incorrect Access Control issue in the /kal-api/auth/users API endpoint. The vulnerability arises because the backend fails to properly validate permissions, allowing an authenticated user with only basic read privileges to access sensitive information about all users on the platform. This excessive data exposure violates the principle of least privilege and can lead to unauthorized disclosure of personal or sensitive user data. The vulnerability is classified under CWE-863 (Incorrect Authorization). The CVSS v3.1 base score is 6.5, indicating a medium severity, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, meaning it is remotely exploitable over the network, requires low attack complexity, requires privileges (authenticated user with read access), no user interaction, unchanged scope, high confidentiality impact, and no impact on integrity or availability. No patches or known exploits are currently available, but the vulnerability poses a significant risk to confidentiality. Organizations using this CMS version should be aware that attackers with basic authenticated access can harvest sensitive user data, potentially leading to privacy violations, compliance issues, and further targeted attacks.

Potential Impact

For European organizations, the primary impact is the unauthorized disclosure of sensitive user information, which can lead to privacy breaches and regulatory non-compliance, especially under GDPR. The exposure of user data can also facilitate social engineering, identity theft, or targeted phishing attacks. Although the vulnerability does not affect system integrity or availability, the confidentiality breach alone can damage organizational reputation and trust. Sectors such as government, healthcare, finance, and critical infrastructure that rely on Kalmia CMS or similar platforms are particularly vulnerable. The medium severity rating reflects that exploitation requires authenticated access, limiting the attack surface to insiders or compromised accounts. However, given the potential volume of exposed data, the impact on European entities handling personal data is significant.

Mitigation Recommendations

1. Immediately audit and restrict access permissions on the /kal-api/auth/users API endpoint to ensure only authorized roles can access sensitive user data. 2. Implement strict backend permission validation to enforce least privilege principles, ensuring users cannot access data beyond their authorization level. 3. Conduct a comprehensive review of all API endpoints for similar access control weaknesses. 4. Monitor logs for unusual or excessive access patterns to user data, which may indicate exploitation attempts. 5. If possible, upgrade or patch Kalmia CMS once a fix is released; until then, consider disabling or restricting the vulnerable API endpoint. 6. Educate users and administrators about the risk of credential compromise, as authenticated access is required for exploitation. 7. Employ network segmentation and multi-factor authentication to reduce the risk of unauthorized authenticated access. 8. Prepare incident response plans focused on data breach scenarios involving user information exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6931fbea0459f550ec00bb30

Added to database: 12/4/2025, 9:23:54 PM

Last enriched: 12/11/2025, 10:02:15 PM

Last updated: 1/19/2026, 7:55:44 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats