CVE-2025-67173: n/a
CVE-2025-67173 is a Cross-Site Request Forgery (CSRF) vulnerability in RiteCMS version 3. 1. 0 that allows attackers to create pages arbitrarily by sending crafted POST requests. The vulnerability requires the attacker to have some level of privileges (PR:H) and user interaction (UI:R), but it can lead to high impact on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the medium severity CVSS score of 6. 8 reflects the significant risk posed by this flaw. European organizations using RiteCMS 3. 1. 0 should prioritize patching or implementing mitigations to prevent unauthorized content injection and potential further exploitation. Countries with higher adoption of RiteCMS or critical web infrastructure relying on it are at greater risk.
AI Analysis
Technical Summary
CVE-2025-67173 is a security vulnerability classified as a Cross-Site Request Forgery (CSRF) affecting the page creation and editing functionality of RiteCMS version 3.1.0. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a malicious request unknowingly, exploiting the trust a web application places in the user's browser. In this case, the flaw allows an attacker to craft a POST request that, when executed by a user with sufficient privileges, results in the arbitrary creation of pages within the CMS. This can lead to unauthorized content injection, defacement, or the introduction of malicious content such as phishing pages or malware distribution points. The CVSS v3.1 score of 6.8 indicates a medium severity with the vector AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H, meaning the attack can be launched remotely over the network with low complexity, but requires the attacker to have high privileges and user interaction. The vulnerability impacts confidentiality, integrity, and availability, as unauthorized page creation can expose sensitive data, alter site content, and disrupt normal operations. No patches or known exploits are currently documented, but the vulnerability is publicly disclosed and should be addressed promptly. The CWE-352 classification confirms the nature of the CSRF issue. Given the nature of CMS platforms as public-facing web applications, exploitation could have significant reputational and operational consequences.
Potential Impact
For European organizations, the impact of CVE-2025-67173 can be substantial, especially for those relying on RiteCMS 3.1.0 for their web presence. Successful exploitation could lead to unauthorized content creation, which might be used to spread misinformation, phishing campaigns, or malware, thereby damaging brand reputation and customer trust. Confidential information could be exposed if sensitive pages are created or manipulated. Integrity of the website content is compromised, potentially affecting business operations and compliance with data protection regulations such as GDPR. Availability may also be impacted if malicious pages disrupt normal site functionality or trigger automated defenses. Organizations in sectors like government, finance, healthcare, and media, which often have stringent security requirements and high public visibility, are particularly vulnerable. The requirement for high privileges and user interaction somewhat limits the attack surface but does not eliminate risk, especially in environments with multiple privileged users or insufficient user training.
Mitigation Recommendations
To mitigate CVE-2025-67173, organizations should implement the following specific measures: 1) Apply any available patches or updates from RiteCMS as soon as they are released. 2) If patches are not yet available, deploy web application firewalls (WAFs) with rules to detect and block suspicious POST requests targeting page creation endpoints. 3) Implement anti-CSRF tokens in all forms related to page creation and editing to ensure requests are legitimate and originate from authenticated users. 4) Enforce strict user privilege management, limiting page creation and editing rights to only necessary personnel. 5) Conduct regular audits of newly created pages to detect unauthorized content promptly. 6) Educate privileged users about the risks of CSRF and safe browsing practices to reduce the likelihood of user interaction exploitation. 7) Monitor web server and application logs for unusual activity patterns indicative of CSRF attempts. 8) Consider deploying Content Security Policy (CSP) headers to reduce the impact of injected malicious content. These targeted actions go beyond generic advice and address the specific mechanics of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-67173: n/a
Description
CVE-2025-67173 is a Cross-Site Request Forgery (CSRF) vulnerability in RiteCMS version 3. 1. 0 that allows attackers to create pages arbitrarily by sending crafted POST requests. The vulnerability requires the attacker to have some level of privileges (PR:H) and user interaction (UI:R), but it can lead to high impact on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the medium severity CVSS score of 6. 8 reflects the significant risk posed by this flaw. European organizations using RiteCMS 3. 1. 0 should prioritize patching or implementing mitigations to prevent unauthorized content injection and potential further exploitation. Countries with higher adoption of RiteCMS or critical web infrastructure relying on it are at greater risk.
AI-Powered Analysis
Technical Analysis
CVE-2025-67173 is a security vulnerability classified as a Cross-Site Request Forgery (CSRF) affecting the page creation and editing functionality of RiteCMS version 3.1.0. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a malicious request unknowingly, exploiting the trust a web application places in the user's browser. In this case, the flaw allows an attacker to craft a POST request that, when executed by a user with sufficient privileges, results in the arbitrary creation of pages within the CMS. This can lead to unauthorized content injection, defacement, or the introduction of malicious content such as phishing pages or malware distribution points. The CVSS v3.1 score of 6.8 indicates a medium severity with the vector AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H, meaning the attack can be launched remotely over the network with low complexity, but requires the attacker to have high privileges and user interaction. The vulnerability impacts confidentiality, integrity, and availability, as unauthorized page creation can expose sensitive data, alter site content, and disrupt normal operations. No patches or known exploits are currently documented, but the vulnerability is publicly disclosed and should be addressed promptly. The CWE-352 classification confirms the nature of the CSRF issue. Given the nature of CMS platforms as public-facing web applications, exploitation could have significant reputational and operational consequences.
Potential Impact
For European organizations, the impact of CVE-2025-67173 can be substantial, especially for those relying on RiteCMS 3.1.0 for their web presence. Successful exploitation could lead to unauthorized content creation, which might be used to spread misinformation, phishing campaigns, or malware, thereby damaging brand reputation and customer trust. Confidential information could be exposed if sensitive pages are created or manipulated. Integrity of the website content is compromised, potentially affecting business operations and compliance with data protection regulations such as GDPR. Availability may also be impacted if malicious pages disrupt normal site functionality or trigger automated defenses. Organizations in sectors like government, finance, healthcare, and media, which often have stringent security requirements and high public visibility, are particularly vulnerable. The requirement for high privileges and user interaction somewhat limits the attack surface but does not eliminate risk, especially in environments with multiple privileged users or insufficient user training.
Mitigation Recommendations
To mitigate CVE-2025-67173, organizations should implement the following specific measures: 1) Apply any available patches or updates from RiteCMS as soon as they are released. 2) If patches are not yet available, deploy web application firewalls (WAFs) with rules to detect and block suspicious POST requests targeting page creation endpoints. 3) Implement anti-CSRF tokens in all forms related to page creation and editing to ensure requests are legitimate and originate from authenticated users. 4) Enforce strict user privilege management, limiting page creation and editing rights to only necessary personnel. 5) Conduct regular audits of newly created pages to detect unauthorized content promptly. 6) Educate privileged users about the risks of CSRF and safe browsing practices to reduce the likelihood of user interaction exploitation. 7) Monitor web server and application logs for unusual activity patterns indicative of CSRF attempts. 8) Consider deploying Content Security Policy (CSP) headers to reduce the impact of injected malicious content. These targeted actions go beyond generic advice and address the specific mechanics of this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-08T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6942f571847f7e98df00bfd3
Added to database: 12/17/2025, 6:24:49 PM
Last enriched: 12/24/2025, 7:32:13 PM
Last updated: 2/4/2026, 5:23:41 AM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67850: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
HighCVE-2025-67849: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
HighCVE-2025-67848: Improper Handling of Insufficient Permissions or Privileges
HighCVE-2025-29867: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in Hancom Inc. Hancom Office 2018
HighCVE-2026-1791: CWE-434 Unrestricted Upload of File with Dangerous Type in Hillstone Networks Operation and Maintenance Security Gateway
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.