Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67174: n/a

0
Medium
VulnerabilityCVE-2025-67174cvecve-2025-67174
Published: Wed Dec 17 2025 (12/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A local file inclusion (LFI) vulnerability in RiteCMS v3.1.0 allows attackers to read arbitrary files on the host via a directory traversal in the admin_language_file and default_page_language_file in the admin.php component

AI-Powered Analysis

AILast updated: 12/24/2025, 19:15:28 UTC

Technical Analysis

CVE-2025-67174 is a local file inclusion vulnerability identified in RiteCMS version 3.1.0, specifically within the admin.php component. The vulnerability arises due to insufficient input validation on the parameters admin_language_file and default_page_language_file, which accept file paths without proper sanitization. This allows an attacker to perform directory traversal attacks by manipulating these parameters to include arbitrary files from the server's filesystem. The attack vector is local, meaning the attacker must have some level of access to interact with the admin.php interface, but no authentication or user interaction is required. Successful exploitation enables reading of sensitive files such as configuration files, password stores, or other critical data, compromising confidentiality. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). The CVSS v3.1 base score is 6.2, reflecting medium severity due to high confidentiality impact but limited integrity and availability impact. No patches or known exploits are currently reported, indicating that the vulnerability is newly disclosed and may not yet be widely exploited. This vulnerability poses a risk to organizations relying on RiteCMS for content management, especially where sensitive data is stored on the same host. Attackers could leverage this flaw to gather information for further attacks or data exfiltration.

Potential Impact

For European organizations using RiteCMS 3.1.0, this vulnerability could lead to unauthorized disclosure of sensitive information, including configuration files, credentials, or other critical data stored on the server. This compromises confidentiality and could facilitate subsequent attacks such as privilege escalation or lateral movement within the network. Although the vulnerability does not directly affect system integrity or availability, the exposure of sensitive files can have severe operational and reputational consequences. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face increased risk of regulatory penalties and loss of customer trust. Additionally, given the local attack vector, organizations with weak internal access controls or exposed administrative interfaces are more vulnerable. The absence of known exploits currently provides a window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

1. Restrict access to the admin.php component by implementing strict network segmentation and access controls, ensuring only authorized personnel can reach this interface. 2. Employ web application firewalls (WAFs) configured to detect and block directory traversal patterns targeting admin_language_file and default_page_language_file parameters. 3. Implement input validation and sanitization at the application level to reject any file path containing traversal sequences such as '../'. 4. Monitor server logs for unusual file access patterns or repeated attempts to access sensitive files via admin.php. 5. If possible, upgrade RiteCMS to a patched version once available or apply vendor-provided security patches promptly. 6. Conduct regular security audits and penetration testing focusing on CMS components to identify and remediate similar vulnerabilities. 7. Limit file permissions on the server to restrict access to sensitive files, minimizing the impact of potential LFI exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6942fb890b6f32e62be62d55

Added to database: 12/17/2025, 6:50:49 PM

Last enriched: 12/24/2025, 7:15:28 PM

Last updated: 2/5/2026, 2:51:01 AM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats