Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67165: n/a

0
Critical
VulnerabilityCVE-2025-67165cvecve-2025-67165
Published: Wed Dec 17 2025 (12/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An Insecure Direct Object Reference (IDOR) in Pagekit CMS v1.0.18 allows attackers to escalate privileges.

AI-Powered Analysis

AILast updated: 12/24/2025, 18:17:57 UTC

Technical Analysis

CVE-2025-67165 is an Insecure Direct Object Reference (IDOR) vulnerability identified in Pagekit CMS version 1.0.18. IDOR vulnerabilities occur when an application exposes internal implementation objects such as files, database records, or keys without proper authorization checks, allowing attackers to manipulate references to access unauthorized data or functions. In this case, the vulnerability permits attackers to escalate privileges, potentially gaining administrative access or other elevated rights within the CMS. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, with an attack vector classified as network (AV:N), requiring no privileges (PR:N) and no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), indicating full system compromise potential. Although the affected versions are not explicitly listed beyond v1.0.18, it is implied that this version is vulnerable. No patches or known exploits are currently documented, but the vulnerability's characteristics suggest it could be exploited remotely with relative ease. The CWE-639 classification confirms the issue relates to authorization bypass via improper validation of object references. This vulnerability could allow attackers to access sensitive data, modify content, or disrupt services by exploiting insufficient access controls within the CMS.

Potential Impact

For European organizations, the impact of CVE-2025-67165 could be severe, especially for those relying on Pagekit CMS for web content management. Successful exploitation can lead to unauthorized data disclosure, defacement of websites, injection of malicious content, or complete takeover of the CMS environment. This compromises the confidentiality and integrity of sensitive business information and can disrupt availability of web services, damaging organizational reputation and causing financial losses. Organizations in sectors such as government, finance, healthcare, and critical infrastructure are particularly at risk due to the sensitive nature of their data and regulatory compliance requirements like GDPR. The remote and unauthenticated nature of the exploit increases the attack surface, making it easier for threat actors to target European entities without needing insider access. Additionally, the lack of current patches means organizations must rely on compensating controls until updates are released, increasing exposure time.

Mitigation Recommendations

1. Monitor official Pagekit CMS channels for security advisories and apply patches immediately once available. 2. Implement strict access control mechanisms at the application and web server levels to restrict unauthorized access to sensitive objects. 3. Conduct thorough code reviews and penetration testing focused on authorization logic and object reference validation within the CMS. 4. Employ Web Application Firewalls (WAFs) configured to detect and block suspicious requests that attempt to manipulate object references. 5. Limit exposure of administrative interfaces to trusted IP addresses or VPNs to reduce attack surface. 6. Enable detailed logging and continuous monitoring to detect anomalous activities indicative of exploitation attempts. 7. Educate development and security teams about IDOR vulnerabilities and secure coding practices to prevent similar issues in custom extensions or integrations. 8. Consider isolating the CMS environment in segmented network zones to contain potential breaches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6942e1e21c1ff091367fecf0

Added to database: 12/17/2025, 5:01:22 PM

Last enriched: 12/24/2025, 6:17:57 PM

Last updated: 2/7/2026, 3:16:21 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats