CVE-2025-67164: n/a
An authenticated arbitrary file upload vulnerability in the /storage/poc.php component of Pagekit CMS v1.0.18 allows attackers to execute arbitrary code via uploading a crafted PHP file.
AI Analysis
Technical Summary
CVE-2025-67164 is a vulnerability identified in Pagekit CMS version 1.0.18, affecting the /storage/poc.php component. The vulnerability allows an authenticated attacker to upload arbitrary files, including malicious PHP scripts, to the server. This arbitrary file upload flaw can be exploited to execute remote code, effectively giving attackers control over the affected web server. The attack vector requires the attacker to have valid authentication credentials, which may be obtained through credential theft, phishing, or weak password policies. Once authenticated, the attacker can craft a PHP file and upload it via the vulnerable endpoint, bypassing any insufficient input validation or file type restrictions. This leads to remote code execution, enabling attackers to manipulate data, deploy backdoors, or pivot within the network. No official patch or CVSS score has been published yet, and no known exploits are reported in the wild. However, the vulnerability's nature suggests a high risk of exploitation once weaponized. The lack of a CVSS score means severity must be assessed based on impact and exploit complexity, which here indicates a high severity due to the critical consequences of remote code execution on web servers.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on Pagekit CMS 1.0.18 for their web presence. Successful exploitation can lead to full compromise of web servers, exposing sensitive customer data, intellectual property, and internal systems. It can also facilitate lateral movement within corporate networks, increasing the risk of ransomware or espionage attacks. Public sector entities, e-commerce platforms, and service providers using Pagekit CMS are particularly vulnerable to reputational damage and regulatory penalties under GDPR if data breaches occur. The requirement for authentication reduces the attack surface but does not eliminate risk, as credential compromise is common. The vulnerability could be leveraged in targeted attacks against European organizations with weak authentication controls or insufficient monitoring. Additionally, the ability to execute arbitrary code can disrupt availability by defacing websites or deploying denial-of-service payloads.
Mitigation Recommendations
Organizations should immediately audit and restrict access to the Pagekit CMS administrative interfaces to trusted personnel only, enforcing strong multi-factor authentication to reduce the risk of credential compromise. Implement strict file upload validation controls, including whitelisting allowed file types and scanning uploaded files for malicious content. Monitor web server logs and application behavior for unusual upload activity or execution of unexpected scripts. Network segmentation should be applied to isolate web servers from critical internal systems, limiting lateral movement in case of compromise. Since no official patch is currently available, consider temporarily disabling or restricting access to the /storage/poc.php endpoint if feasible. Regularly check for security advisories from Pagekit CMS developers and apply patches promptly once released. Employ web application firewalls (WAFs) with custom rules to detect and block attempts to upload or execute unauthorized files. Conduct user training to prevent credential theft and enforce robust password policies.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-67164: n/a
Description
An authenticated arbitrary file upload vulnerability in the /storage/poc.php component of Pagekit CMS v1.0.18 allows attackers to execute arbitrary code via uploading a crafted PHP file.
AI-Powered Analysis
Technical Analysis
CVE-2025-67164 is a vulnerability identified in Pagekit CMS version 1.0.18, affecting the /storage/poc.php component. The vulnerability allows an authenticated attacker to upload arbitrary files, including malicious PHP scripts, to the server. This arbitrary file upload flaw can be exploited to execute remote code, effectively giving attackers control over the affected web server. The attack vector requires the attacker to have valid authentication credentials, which may be obtained through credential theft, phishing, or weak password policies. Once authenticated, the attacker can craft a PHP file and upload it via the vulnerable endpoint, bypassing any insufficient input validation or file type restrictions. This leads to remote code execution, enabling attackers to manipulate data, deploy backdoors, or pivot within the network. No official patch or CVSS score has been published yet, and no known exploits are reported in the wild. However, the vulnerability's nature suggests a high risk of exploitation once weaponized. The lack of a CVSS score means severity must be assessed based on impact and exploit complexity, which here indicates a high severity due to the critical consequences of remote code execution on web servers.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on Pagekit CMS 1.0.18 for their web presence. Successful exploitation can lead to full compromise of web servers, exposing sensitive customer data, intellectual property, and internal systems. It can also facilitate lateral movement within corporate networks, increasing the risk of ransomware or espionage attacks. Public sector entities, e-commerce platforms, and service providers using Pagekit CMS are particularly vulnerable to reputational damage and regulatory penalties under GDPR if data breaches occur. The requirement for authentication reduces the attack surface but does not eliminate risk, as credential compromise is common. The vulnerability could be leveraged in targeted attacks against European organizations with weak authentication controls or insufficient monitoring. Additionally, the ability to execute arbitrary code can disrupt availability by defacing websites or deploying denial-of-service payloads.
Mitigation Recommendations
Organizations should immediately audit and restrict access to the Pagekit CMS administrative interfaces to trusted personnel only, enforcing strong multi-factor authentication to reduce the risk of credential compromise. Implement strict file upload validation controls, including whitelisting allowed file types and scanning uploaded files for malicious content. Monitor web server logs and application behavior for unusual upload activity or execution of unexpected scripts. Network segmentation should be applied to isolate web servers from critical internal systems, limiting lateral movement in case of compromise. Since no official patch is currently available, consider temporarily disabling or restricting access to the /storage/poc.php endpoint if feasible. Regularly check for security advisories from Pagekit CMS developers and apply patches promptly once released. Employ web application firewalls (WAFs) with custom rules to detect and block attempts to upload or execute unauthorized files. Conduct user training to prevent credential theft and enforce robust password policies.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-08T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6942e1e21c1ff091367feced
Added to database: 12/17/2025, 5:01:22 PM
Last enriched: 12/17/2025, 5:16:48 PM
Last updated: 12/18/2025, 6:42:20 AM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-68459: Improper neutralization of special elements used in an OS command ('OS Command Injection') in Ruijie Networks Co., Ltd. AP180-PE V3.xx
HighCVE-2025-47387: CWE-822 Untrusted Pointer Dereference in Qualcomm, Inc. Snapdragon
HighCVE-2025-47382: CWE-863: Incorrect Authorization in Qualcomm, Inc. Snapdragon
HighCVE-2025-47372: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon
CriticalCVE-2025-47350: CWE-416 Use After Free in Qualcomm, Inc. Snapdragon
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.