Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67164: n/a

0
Critical
VulnerabilityCVE-2025-67164cvecve-2025-67164
Published: Wed Dec 17 2025 (12/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An authenticated arbitrary file upload vulnerability in the /storage/poc.php component of Pagekit CMS v1.0.18 allows attackers to execute arbitrary code via uploading a crafted PHP file.

AI-Powered Analysis

AILast updated: 12/24/2025, 18:18:50 UTC

Technical Analysis

CVE-2025-67164 is a critical vulnerability identified in Pagekit CMS version 1.0.18, involving an authenticated arbitrary file upload flaw located in the /storage/poc.php component. The vulnerability allows an attacker who has valid authentication credentials to upload a malicious PHP file to the server. This uploaded file can then be executed, enabling remote code execution (RCE) on the affected system. The vulnerability is classified under CWEs 78 (OS Command Injection), 94 (Code Injection), and 434 (Unrestricted Upload of File with Dangerous Type), indicating that the root cause involves improper validation and sanitization of uploaded files and commands. The CVSS v3.1 base score is 9.9, reflecting a critical severity level with network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and scope changed (S:C), with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the vulnerability's characteristics make it a prime target for attackers to gain full control over vulnerable web servers. The lack of an official patch at the time of publication increases the urgency for organizations to implement interim mitigations. The vulnerability affects Pagekit CMS installations running version 1.0.18, a content management system used for website management, which may be deployed in various organizational environments.

Potential Impact

For European organizations, the impact of CVE-2025-67164 can be severe. Successful exploitation leads to full remote code execution, allowing attackers to compromise web servers, access sensitive data, modify or delete content, and disrupt services. This can result in data breaches, defacement of websites, loss of customer trust, and potential regulatory penalties under GDPR due to unauthorized data access or exposure. Organizations relying on Pagekit CMS for public-facing websites or internal portals are at risk of operational disruption and reputational damage. The critical nature of the vulnerability means that attackers can exploit it remotely with minimal complexity once authenticated, increasing the likelihood of targeted attacks or lateral movement within networks. Additionally, the scope change in the CVSS vector indicates that the vulnerability can affect resources beyond the initially vulnerable component, potentially compromising other parts of the infrastructure. The absence of known exploits currently provides a window for proactive defense, but the situation demands immediate attention to prevent exploitation.

Mitigation Recommendations

1. Immediate Actions: Restrict access to the /storage/poc.php endpoint to trusted administrators only, using IP whitelisting or network segmentation. 2. Authentication Hardening: Enforce strong authentication mechanisms and monitor for suspicious login attempts to reduce the risk of credential compromise. 3. Input Validation: Implement strict server-side validation to restrict file types and sanitize file names during upload processes. 4. File Upload Controls: Disable or limit file upload functionality where not necessary, and enforce storage of uploaded files outside the web root to prevent direct execution. 5. Web Application Firewall (WAF): Deploy and configure a WAF with rules to detect and block malicious file uploads and suspicious HTTP requests targeting the vulnerable component. 6. Monitoring and Logging: Enhance logging around file upload activities and monitor for anomalous behavior indicative of exploitation attempts. 7. Patch Management: Monitor Pagekit CMS vendor communications for official patches or updates addressing this vulnerability and apply them promptly once available. 8. Incident Response Preparedness: Prepare to respond to potential incidents by having backups and recovery plans in place for affected web servers. These steps go beyond generic advice by focusing on immediate access restrictions, enhanced monitoring, and architectural controls to mitigate risk until a patch is released.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6942e1e21c1ff091367feced

Added to database: 12/17/2025, 5:01:22 PM

Last enriched: 12/24/2025, 6:18:50 PM

Last updated: 2/7/2026, 1:10:47 PM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats