CVE-2025-67174: n/a
A local file inclusion (LFI) vulnerability in RiteCMS v3.1.0 allows attackers to read arbitrary files on the host via a directory traversal in the admin_language_file and default_page_language_file in the admin.php component
AI Analysis
Technical Summary
CVE-2025-67174 is a local file inclusion vulnerability discovered in RiteCMS version 3.1.0, specifically within the admin.php component. The vulnerability arises from insufficient input validation on the parameters admin_language_file and default_page_language_file, which are susceptible to directory traversal attacks. By manipulating these parameters, an attacker can traverse directories and include arbitrary files from the server's filesystem. This can lead to disclosure of sensitive information such as configuration files, password files, or other critical data stored on the host. The vulnerability does not require authentication, increasing its risk profile, although it is limited to reading files locally accessible to the web server process. No public exploits have been reported yet, and no official patches or CVSS scores are currently available. The lack of a CVSS score necessitates an assessment based on the potential impact and exploitability. The vulnerability primarily threatens confidentiality but could also aid in further attacks if sensitive credentials or system information are exposed. RiteCMS is a content management system used by various organizations, and the presence of this vulnerability in the administrative interface increases the risk if the admin panel is accessible or poorly secured. The vulnerability was published on December 17, 2025, with the CVE reserved a few days earlier. Given the technical details, this vulnerability is critical to address promptly to prevent unauthorized data disclosure.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive data hosted on RiteCMS 3.1.0 installations. Attackers exploiting this flaw can access configuration files, database credentials, or other sensitive information, potentially leading to further compromise such as privilege escalation or lateral movement within the network. Organizations with publicly accessible or weakly protected admin interfaces are particularly vulnerable. The exposure of sensitive data can result in regulatory non-compliance, especially under GDPR, leading to legal and financial repercussions. Additionally, the information disclosed could be leveraged for targeted attacks against critical infrastructure or high-value targets within Europe. The impact extends to sectors relying on RiteCMS for content management, including government, education, and private enterprises. The absence of known exploits currently limits immediate widespread impact, but the vulnerability's presence in a core administrative component suggests a high risk if weaponized.
Mitigation Recommendations
European organizations should immediately restrict access to the admin.php interface of RiteCMS to trusted networks or VPNs to reduce exposure. Implement strict input validation and sanitization on the admin_language_file and default_page_language_file parameters to prevent directory traversal attempts. Monitor web server logs for unusual file access patterns or attempts to include unexpected files. If possible, upgrade RiteCMS to a patched version once available or apply vendor-recommended patches promptly. Employ web application firewalls (WAFs) with rules targeting directory traversal and LFI attack patterns to block exploitation attempts. Conduct regular security audits and penetration testing focused on CMS components to identify and remediate similar vulnerabilities. Additionally, enforce the principle of least privilege on the web server to limit file access to only necessary directories and files, minimizing the potential impact of successful exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2025-67174: n/a
Description
A local file inclusion (LFI) vulnerability in RiteCMS v3.1.0 allows attackers to read arbitrary files on the host via a directory traversal in the admin_language_file and default_page_language_file in the admin.php component
AI-Powered Analysis
Technical Analysis
CVE-2025-67174 is a local file inclusion vulnerability discovered in RiteCMS version 3.1.0, specifically within the admin.php component. The vulnerability arises from insufficient input validation on the parameters admin_language_file and default_page_language_file, which are susceptible to directory traversal attacks. By manipulating these parameters, an attacker can traverse directories and include arbitrary files from the server's filesystem. This can lead to disclosure of sensitive information such as configuration files, password files, or other critical data stored on the host. The vulnerability does not require authentication, increasing its risk profile, although it is limited to reading files locally accessible to the web server process. No public exploits have been reported yet, and no official patches or CVSS scores are currently available. The lack of a CVSS score necessitates an assessment based on the potential impact and exploitability. The vulnerability primarily threatens confidentiality but could also aid in further attacks if sensitive credentials or system information are exposed. RiteCMS is a content management system used by various organizations, and the presence of this vulnerability in the administrative interface increases the risk if the admin panel is accessible or poorly secured. The vulnerability was published on December 17, 2025, with the CVE reserved a few days earlier. Given the technical details, this vulnerability is critical to address promptly to prevent unauthorized data disclosure.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive data hosted on RiteCMS 3.1.0 installations. Attackers exploiting this flaw can access configuration files, database credentials, or other sensitive information, potentially leading to further compromise such as privilege escalation or lateral movement within the network. Organizations with publicly accessible or weakly protected admin interfaces are particularly vulnerable. The exposure of sensitive data can result in regulatory non-compliance, especially under GDPR, leading to legal and financial repercussions. Additionally, the information disclosed could be leveraged for targeted attacks against critical infrastructure or high-value targets within Europe. The impact extends to sectors relying on RiteCMS for content management, including government, education, and private enterprises. The absence of known exploits currently limits immediate widespread impact, but the vulnerability's presence in a core administrative component suggests a high risk if weaponized.
Mitigation Recommendations
European organizations should immediately restrict access to the admin.php interface of RiteCMS to trusted networks or VPNs to reduce exposure. Implement strict input validation and sanitization on the admin_language_file and default_page_language_file parameters to prevent directory traversal attempts. Monitor web server logs for unusual file access patterns or attempts to include unexpected files. If possible, upgrade RiteCMS to a patched version once available or apply vendor-recommended patches promptly. Employ web application firewalls (WAFs) with rules targeting directory traversal and LFI attack patterns to block exploitation attempts. Conduct regular security audits and penetration testing focused on CMS components to identify and remediate similar vulnerabilities. Additionally, enforce the principle of least privilege on the web server to limit file access to only necessary directories and files, minimizing the potential impact of successful exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-08T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6942fb890b6f32e62be62d55
Added to database: 12/17/2025, 6:50:49 PM
Last enriched: 12/17/2025, 6:51:24 PM
Last updated: 12/18/2025, 7:46:44 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-6326: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in AncoraThemes Inset
UnknownCVE-2025-6324: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MatrixAddons Easy Invoice
UnknownCVE-2025-67546: Exposure of Sensitive System Information to an Unauthorized Control Sphere in weDevs WP ERP
UnknownCVE-2025-66119: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Bob Hostel
UnknownCVE-2025-66118: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in BoldGrid Sprout Clients
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.