CVE-2025-67174: n/a
A local file inclusion (LFI) vulnerability in RiteCMS v3.1.0 allows attackers to read arbitrary files on the host via a directory traversal in the admin_language_file and default_page_language_file in the admin.php component
AI Analysis
Technical Summary
CVE-2025-67174 is a local file inclusion vulnerability identified in RiteCMS version 3.1.0, specifically within the admin.php component. The vulnerability arises due to insufficient input validation on the parameters admin_language_file and default_page_language_file, which accept file paths without proper sanitization. This allows an attacker to perform directory traversal attacks by manipulating these parameters to include arbitrary files from the server's filesystem. The attack vector is local, meaning the attacker must have some level of access to interact with the admin.php interface, but no authentication or user interaction is required. Successful exploitation enables reading of sensitive files such as configuration files, password stores, or other critical data, compromising confidentiality. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). The CVSS v3.1 base score is 6.2, reflecting medium severity due to high confidentiality impact but limited integrity and availability impact. No patches or known exploits are currently reported, indicating that the vulnerability is newly disclosed and may not yet be widely exploited. This vulnerability poses a risk to organizations relying on RiteCMS for content management, especially where sensitive data is stored on the same host. Attackers could leverage this flaw to gather information for further attacks or data exfiltration.
Potential Impact
For European organizations using RiteCMS 3.1.0, this vulnerability could lead to unauthorized disclosure of sensitive information, including configuration files, credentials, or other critical data stored on the server. This compromises confidentiality and could facilitate subsequent attacks such as privilege escalation or lateral movement within the network. Although the vulnerability does not directly affect system integrity or availability, the exposure of sensitive files can have severe operational and reputational consequences. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face increased risk of regulatory penalties and loss of customer trust. Additionally, given the local attack vector, organizations with weak internal access controls or exposed administrative interfaces are more vulnerable. The absence of known exploits currently provides a window for proactive mitigation before widespread exploitation occurs.
Mitigation Recommendations
1. Restrict access to the admin.php component by implementing strict network segmentation and access controls, ensuring only authorized personnel can reach this interface. 2. Employ web application firewalls (WAFs) configured to detect and block directory traversal patterns targeting admin_language_file and default_page_language_file parameters. 3. Implement input validation and sanitization at the application level to reject any file path containing traversal sequences such as '../'. 4. Monitor server logs for unusual file access patterns or repeated attempts to access sensitive files via admin.php. 5. If possible, upgrade RiteCMS to a patched version once available or apply vendor-provided security patches promptly. 6. Conduct regular security audits and penetration testing focusing on CMS components to identify and remediate similar vulnerabilities. 7. Limit file permissions on the server to restrict access to sensitive files, minimizing the impact of potential LFI exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-67174: n/a
Description
A local file inclusion (LFI) vulnerability in RiteCMS v3.1.0 allows attackers to read arbitrary files on the host via a directory traversal in the admin_language_file and default_page_language_file in the admin.php component
AI-Powered Analysis
Technical Analysis
CVE-2025-67174 is a local file inclusion vulnerability identified in RiteCMS version 3.1.0, specifically within the admin.php component. The vulnerability arises due to insufficient input validation on the parameters admin_language_file and default_page_language_file, which accept file paths without proper sanitization. This allows an attacker to perform directory traversal attacks by manipulating these parameters to include arbitrary files from the server's filesystem. The attack vector is local, meaning the attacker must have some level of access to interact with the admin.php interface, but no authentication or user interaction is required. Successful exploitation enables reading of sensitive files such as configuration files, password stores, or other critical data, compromising confidentiality. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). The CVSS v3.1 base score is 6.2, reflecting medium severity due to high confidentiality impact but limited integrity and availability impact. No patches or known exploits are currently reported, indicating that the vulnerability is newly disclosed and may not yet be widely exploited. This vulnerability poses a risk to organizations relying on RiteCMS for content management, especially where sensitive data is stored on the same host. Attackers could leverage this flaw to gather information for further attacks or data exfiltration.
Potential Impact
For European organizations using RiteCMS 3.1.0, this vulnerability could lead to unauthorized disclosure of sensitive information, including configuration files, credentials, or other critical data stored on the server. This compromises confidentiality and could facilitate subsequent attacks such as privilege escalation or lateral movement within the network. Although the vulnerability does not directly affect system integrity or availability, the exposure of sensitive files can have severe operational and reputational consequences. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face increased risk of regulatory penalties and loss of customer trust. Additionally, given the local attack vector, organizations with weak internal access controls or exposed administrative interfaces are more vulnerable. The absence of known exploits currently provides a window for proactive mitigation before widespread exploitation occurs.
Mitigation Recommendations
1. Restrict access to the admin.php component by implementing strict network segmentation and access controls, ensuring only authorized personnel can reach this interface. 2. Employ web application firewalls (WAFs) configured to detect and block directory traversal patterns targeting admin_language_file and default_page_language_file parameters. 3. Implement input validation and sanitization at the application level to reject any file path containing traversal sequences such as '../'. 4. Monitor server logs for unusual file access patterns or repeated attempts to access sensitive files via admin.php. 5. If possible, upgrade RiteCMS to a patched version once available or apply vendor-provided security patches promptly. 6. Conduct regular security audits and penetration testing focusing on CMS components to identify and remediate similar vulnerabilities. 7. Limit file permissions on the server to restrict access to sensitive files, minimizing the impact of potential LFI exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-08T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6942fb890b6f32e62be62d55
Added to database: 12/17/2025, 6:50:49 PM
Last enriched: 12/24/2025, 7:15:28 PM
Last updated: 2/5/2026, 2:51:01 AM
Views: 77
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11730: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Zyxel ATP series firmware
HighCVE-2026-1898: Improper Access Controls in WeKan
MediumCVE-2026-1897: Missing Authorization in WeKan
MediumCVE-2026-1896: Improper Access Controls in WeKan
MediumCVE-2025-13192: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in roxnor Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.