Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67164: n/a

0
Critical
VulnerabilityCVE-2025-67164cvecve-2025-67164
Published: Wed Dec 17 2025 (12/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An authenticated arbitrary file upload vulnerability in the /storage/poc.php component of Pagekit CMS v1.0.18 allows attackers to execute arbitrary code via uploading a crafted PHP file.

AI-Powered Analysis

AILast updated: 12/17/2025, 17:16:48 UTC

Technical Analysis

CVE-2025-67164 is a vulnerability identified in Pagekit CMS version 1.0.18, affecting the /storage/poc.php component. The vulnerability allows an authenticated attacker to upload arbitrary files, including malicious PHP scripts, to the server. This arbitrary file upload flaw can be exploited to execute remote code, effectively giving attackers control over the affected web server. The attack vector requires the attacker to have valid authentication credentials, which may be obtained through credential theft, phishing, or weak password policies. Once authenticated, the attacker can craft a PHP file and upload it via the vulnerable endpoint, bypassing any insufficient input validation or file type restrictions. This leads to remote code execution, enabling attackers to manipulate data, deploy backdoors, or pivot within the network. No official patch or CVSS score has been published yet, and no known exploits are reported in the wild. However, the vulnerability's nature suggests a high risk of exploitation once weaponized. The lack of a CVSS score means severity must be assessed based on impact and exploit complexity, which here indicates a high severity due to the critical consequences of remote code execution on web servers.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on Pagekit CMS 1.0.18 for their web presence. Successful exploitation can lead to full compromise of web servers, exposing sensitive customer data, intellectual property, and internal systems. It can also facilitate lateral movement within corporate networks, increasing the risk of ransomware or espionage attacks. Public sector entities, e-commerce platforms, and service providers using Pagekit CMS are particularly vulnerable to reputational damage and regulatory penalties under GDPR if data breaches occur. The requirement for authentication reduces the attack surface but does not eliminate risk, as credential compromise is common. The vulnerability could be leveraged in targeted attacks against European organizations with weak authentication controls or insufficient monitoring. Additionally, the ability to execute arbitrary code can disrupt availability by defacing websites or deploying denial-of-service payloads.

Mitigation Recommendations

Organizations should immediately audit and restrict access to the Pagekit CMS administrative interfaces to trusted personnel only, enforcing strong multi-factor authentication to reduce the risk of credential compromise. Implement strict file upload validation controls, including whitelisting allowed file types and scanning uploaded files for malicious content. Monitor web server logs and application behavior for unusual upload activity or execution of unexpected scripts. Network segmentation should be applied to isolate web servers from critical internal systems, limiting lateral movement in case of compromise. Since no official patch is currently available, consider temporarily disabling or restricting access to the /storage/poc.php endpoint if feasible. Regularly check for security advisories from Pagekit CMS developers and apply patches promptly once released. Employ web application firewalls (WAFs) with custom rules to detect and block attempts to upload or execute unauthorized files. Conduct user training to prevent credential theft and enforce robust password policies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6942e1e21c1ff091367feced

Added to database: 12/17/2025, 5:01:22 PM

Last enriched: 12/17/2025, 5:16:48 PM

Last updated: 12/18/2025, 6:42:20 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats