Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67174: n/a

0
Unknown
VulnerabilityCVE-2025-67174cvecve-2025-67174
Published: Wed Dec 17 2025 (12/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A local file inclusion (LFI) vulnerability in RiteCMS v3.1.0 allows attackers to read arbitrary files on the host via a directory traversal in the admin_language_file and default_page_language_file in the admin.php component

AI-Powered Analysis

AILast updated: 12/17/2025, 18:51:24 UTC

Technical Analysis

CVE-2025-67174 is a local file inclusion vulnerability discovered in RiteCMS version 3.1.0, specifically within the admin.php component. The vulnerability arises from insufficient input validation on the parameters admin_language_file and default_page_language_file, which are susceptible to directory traversal attacks. By manipulating these parameters, an attacker can traverse directories and include arbitrary files from the server's filesystem. This can lead to disclosure of sensitive information such as configuration files, password files, or other critical data stored on the host. The vulnerability does not require authentication, increasing its risk profile, although it is limited to reading files locally accessible to the web server process. No public exploits have been reported yet, and no official patches or CVSS scores are currently available. The lack of a CVSS score necessitates an assessment based on the potential impact and exploitability. The vulnerability primarily threatens confidentiality but could also aid in further attacks if sensitive credentials or system information are exposed. RiteCMS is a content management system used by various organizations, and the presence of this vulnerability in the administrative interface increases the risk if the admin panel is accessible or poorly secured. The vulnerability was published on December 17, 2025, with the CVE reserved a few days earlier. Given the technical details, this vulnerability is critical to address promptly to prevent unauthorized data disclosure.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive data hosted on RiteCMS 3.1.0 installations. Attackers exploiting this flaw can access configuration files, database credentials, or other sensitive information, potentially leading to further compromise such as privilege escalation or lateral movement within the network. Organizations with publicly accessible or weakly protected admin interfaces are particularly vulnerable. The exposure of sensitive data can result in regulatory non-compliance, especially under GDPR, leading to legal and financial repercussions. Additionally, the information disclosed could be leveraged for targeted attacks against critical infrastructure or high-value targets within Europe. The impact extends to sectors relying on RiteCMS for content management, including government, education, and private enterprises. The absence of known exploits currently limits immediate widespread impact, but the vulnerability's presence in a core administrative component suggests a high risk if weaponized.

Mitigation Recommendations

European organizations should immediately restrict access to the admin.php interface of RiteCMS to trusted networks or VPNs to reduce exposure. Implement strict input validation and sanitization on the admin_language_file and default_page_language_file parameters to prevent directory traversal attempts. Monitor web server logs for unusual file access patterns or attempts to include unexpected files. If possible, upgrade RiteCMS to a patched version once available or apply vendor-recommended patches promptly. Employ web application firewalls (WAFs) with rules targeting directory traversal and LFI attack patterns to block exploitation attempts. Conduct regular security audits and penetration testing focused on CMS components to identify and remediate similar vulnerabilities. Additionally, enforce the principle of least privilege on the web server to limit file access to only necessary directories and files, minimizing the potential impact of successful exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6942fb890b6f32e62be62d55

Added to database: 12/17/2025, 6:50:49 PM

Last enriched: 12/17/2025, 6:51:24 PM

Last updated: 12/18/2025, 7:46:44 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats