Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67165: n/a

0
Critical
VulnerabilityCVE-2025-67165cvecve-2025-67165
Published: Wed Dec 17 2025 (12/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An Insecure Direct Object Reference (IDOR) in Pagekit CMS v1.0.18 allows attackers to escalate privileges.

AI-Powered Analysis

AILast updated: 12/17/2025, 17:16:31 UTC

Technical Analysis

CVE-2025-67165 is an Insecure Direct Object Reference (IDOR) vulnerability identified in Pagekit CMS version 1.0.18. IDOR vulnerabilities occur when an application exposes references to internal implementation objects such as files, database records, or keys without proper authorization checks. In this case, the vulnerability allows attackers to bypass access controls and escalate privileges by manipulating object references directly. This could enable an attacker to gain unauthorized administrative rights or access sensitive data within the CMS. The vulnerability was reserved on December 8, 2025, and published on December 17, 2025, but no CVSS score or patch information is currently available, and no exploits have been reported in the wild. Pagekit CMS is a lightweight content management system used for building websites, and version 1.0.18 is specifically affected. The lack of a patch means organizations must implement compensating controls until an official fix is released. The vulnerability's exploitation requires the attacker to interact with the system, likely through crafted HTTP requests targeting object references in URLs or API endpoints. The absence of authentication requirements is not explicitly stated, but privilege escalation suggests that some level of access might be needed initially. The vulnerability impacts confidentiality, integrity, and availability by enabling unauthorized access and potential modification of CMS content or configurations.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized administrative access to websites managed by Pagekit CMS, resulting in data breaches, defacement, or unauthorized content manipulation. This could damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR violations), and disrupt business operations reliant on web presence. The impact is particularly significant for organizations in sectors such as government, finance, healthcare, and media, where website integrity and data confidentiality are critical. Since Pagekit CMS is used by small to medium-sized enterprises and some public sector entities in Europe, the risk is non-negligible. Attackers could leverage this vulnerability to implant malicious content, steal user data, or pivot to internal networks. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as details become public. The vulnerability could also be used as a stepping stone for more complex attacks targeting European digital infrastructure.

Mitigation Recommendations

Until an official patch is released, European organizations should implement strict access control validation on all object references within Pagekit CMS. This includes reviewing and hardening authorization logic to ensure users can only access objects they are permitted to. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious manipulation of object references in HTTP requests. Conduct thorough code audits and penetration testing focused on IDOR vectors within the CMS. Limit administrative access to trusted IP addresses and enforce multi-factor authentication (MFA) for all CMS users. Monitor logs for unusual access patterns or privilege escalations. Consider isolating the CMS environment from critical internal networks to reduce lateral movement risks. Educate developers and administrators on secure coding practices to prevent similar vulnerabilities. Once a patch is available, prioritize immediate deployment. Additionally, maintain regular backups of website content and configurations to enable rapid recovery if compromise occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6942e1e21c1ff091367fecf0

Added to database: 12/17/2025, 5:01:22 PM

Last enriched: 12/17/2025, 5:16:31 PM

Last updated: 12/18/2025, 7:31:55 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats