CVE-2025-67164: n/a
An authenticated arbitrary file upload vulnerability in the /storage/poc.php component of Pagekit CMS v1.0.18 allows attackers to execute arbitrary code via uploading a crafted PHP file.
AI Analysis
Technical Summary
CVE-2025-67164 is a critical vulnerability identified in Pagekit CMS version 1.0.18, involving an authenticated arbitrary file upload flaw located in the /storage/poc.php component. The vulnerability allows an attacker who has valid authentication credentials to upload a malicious PHP file to the server. This uploaded file can then be executed, enabling remote code execution (RCE) on the affected system. The vulnerability is classified under CWEs 78 (OS Command Injection), 94 (Code Injection), and 434 (Unrestricted Upload of File with Dangerous Type), indicating that the root cause involves improper validation and sanitization of uploaded files and commands. The CVSS v3.1 base score is 9.9, reflecting a critical severity level with network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and scope changed (S:C), with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the vulnerability's characteristics make it a prime target for attackers to gain full control over vulnerable web servers. The lack of an official patch at the time of publication increases the urgency for organizations to implement interim mitigations. The vulnerability affects Pagekit CMS installations running version 1.0.18, a content management system used for website management, which may be deployed in various organizational environments.
Potential Impact
For European organizations, the impact of CVE-2025-67164 can be severe. Successful exploitation leads to full remote code execution, allowing attackers to compromise web servers, access sensitive data, modify or delete content, and disrupt services. This can result in data breaches, defacement of websites, loss of customer trust, and potential regulatory penalties under GDPR due to unauthorized data access or exposure. Organizations relying on Pagekit CMS for public-facing websites or internal portals are at risk of operational disruption and reputational damage. The critical nature of the vulnerability means that attackers can exploit it remotely with minimal complexity once authenticated, increasing the likelihood of targeted attacks or lateral movement within networks. Additionally, the scope change in the CVSS vector indicates that the vulnerability can affect resources beyond the initially vulnerable component, potentially compromising other parts of the infrastructure. The absence of known exploits currently provides a window for proactive defense, but the situation demands immediate attention to prevent exploitation.
Mitigation Recommendations
1. Immediate Actions: Restrict access to the /storage/poc.php endpoint to trusted administrators only, using IP whitelisting or network segmentation. 2. Authentication Hardening: Enforce strong authentication mechanisms and monitor for suspicious login attempts to reduce the risk of credential compromise. 3. Input Validation: Implement strict server-side validation to restrict file types and sanitize file names during upload processes. 4. File Upload Controls: Disable or limit file upload functionality where not necessary, and enforce storage of uploaded files outside the web root to prevent direct execution. 5. Web Application Firewall (WAF): Deploy and configure a WAF with rules to detect and block malicious file uploads and suspicious HTTP requests targeting the vulnerable component. 6. Monitoring and Logging: Enhance logging around file upload activities and monitor for anomalous behavior indicative of exploitation attempts. 7. Patch Management: Monitor Pagekit CMS vendor communications for official patches or updates addressing this vulnerability and apply them promptly once available. 8. Incident Response Preparedness: Prepare to respond to potential incidents by having backups and recovery plans in place for affected web servers. These steps go beyond generic advice by focusing on immediate access restrictions, enhanced monitoring, and architectural controls to mitigate risk until a patch is released.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-67164: n/a
Description
An authenticated arbitrary file upload vulnerability in the /storage/poc.php component of Pagekit CMS v1.0.18 allows attackers to execute arbitrary code via uploading a crafted PHP file.
AI-Powered Analysis
Technical Analysis
CVE-2025-67164 is a critical vulnerability identified in Pagekit CMS version 1.0.18, involving an authenticated arbitrary file upload flaw located in the /storage/poc.php component. The vulnerability allows an attacker who has valid authentication credentials to upload a malicious PHP file to the server. This uploaded file can then be executed, enabling remote code execution (RCE) on the affected system. The vulnerability is classified under CWEs 78 (OS Command Injection), 94 (Code Injection), and 434 (Unrestricted Upload of File with Dangerous Type), indicating that the root cause involves improper validation and sanitization of uploaded files and commands. The CVSS v3.1 base score is 9.9, reflecting a critical severity level with network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and scope changed (S:C), with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the vulnerability's characteristics make it a prime target for attackers to gain full control over vulnerable web servers. The lack of an official patch at the time of publication increases the urgency for organizations to implement interim mitigations. The vulnerability affects Pagekit CMS installations running version 1.0.18, a content management system used for website management, which may be deployed in various organizational environments.
Potential Impact
For European organizations, the impact of CVE-2025-67164 can be severe. Successful exploitation leads to full remote code execution, allowing attackers to compromise web servers, access sensitive data, modify or delete content, and disrupt services. This can result in data breaches, defacement of websites, loss of customer trust, and potential regulatory penalties under GDPR due to unauthorized data access or exposure. Organizations relying on Pagekit CMS for public-facing websites or internal portals are at risk of operational disruption and reputational damage. The critical nature of the vulnerability means that attackers can exploit it remotely with minimal complexity once authenticated, increasing the likelihood of targeted attacks or lateral movement within networks. Additionally, the scope change in the CVSS vector indicates that the vulnerability can affect resources beyond the initially vulnerable component, potentially compromising other parts of the infrastructure. The absence of known exploits currently provides a window for proactive defense, but the situation demands immediate attention to prevent exploitation.
Mitigation Recommendations
1. Immediate Actions: Restrict access to the /storage/poc.php endpoint to trusted administrators only, using IP whitelisting or network segmentation. 2. Authentication Hardening: Enforce strong authentication mechanisms and monitor for suspicious login attempts to reduce the risk of credential compromise. 3. Input Validation: Implement strict server-side validation to restrict file types and sanitize file names during upload processes. 4. File Upload Controls: Disable or limit file upload functionality where not necessary, and enforce storage of uploaded files outside the web root to prevent direct execution. 5. Web Application Firewall (WAF): Deploy and configure a WAF with rules to detect and block malicious file uploads and suspicious HTTP requests targeting the vulnerable component. 6. Monitoring and Logging: Enhance logging around file upload activities and monitor for anomalous behavior indicative of exploitation attempts. 7. Patch Management: Monitor Pagekit CMS vendor communications for official patches or updates addressing this vulnerability and apply them promptly once available. 8. Incident Response Preparedness: Prepare to respond to potential incidents by having backups and recovery plans in place for affected web servers. These steps go beyond generic advice by focusing on immediate access restrictions, enhanced monitoring, and architectural controls to mitigate risk until a patch is released.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-08T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6942e1e21c1ff091367feced
Added to database: 12/17/2025, 5:01:22 PM
Last enriched: 12/24/2025, 6:18:50 PM
Last updated: 2/7/2026, 1:10:47 PM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.