CVE-2025-8119: CWE-352 Cross-Site Request Forgery (CSRF) in Polska Akademia Dostępności PAD CMS
CVE-2025-8119 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability affecting the password reset functionality of the Polska Akademia Dostępności (PAD) CMS. An attacker can craft a malicious website that, when visited by an authenticated user, triggers a POST request to change the user's password without their consent. This vulnerability affects all three templates of PAD CMS: www, bip, and www+bip. The product is End-Of-Life, and no patches will be released by the vendor. Exploitation does not require authentication but does require user interaction (visiting a malicious site). The CVSS 4. 0 base score is 5. 1, reflecting a medium impact primarily on integrity with limited impact on confidentiality and availability. No known exploits are currently in the wild. European organizations using PAD CMS are at risk, especially those with public-facing installations relying on these templates.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-8119 is a Cross-Site Request Forgery (CSRF) flaw in the password reset functionality of the Polska Akademia Dostępności (PAD) CMS, a content management system used primarily in Poland and possibly other European institutions. CSRF vulnerabilities allow attackers to perform unauthorized actions on behalf of authenticated users by tricking them into submitting forged requests. In this case, an attacker can create a specially crafted website that, when visited by a logged-in user of PAD CMS, automatically sends a POST request to the password reset endpoint, changing the victim's password to a value chosen by the attacker. This compromises the integrity of user accounts, potentially leading to account takeover. The vulnerability affects all three templates of PAD CMS: www, bip, and www+bip, indicating a widespread issue within the product. The product is End-Of-Life, meaning no official patches or updates will be provided by the vendor, Polska Akademia Dostępności, increasing the risk for users who continue to operate the software. The CVSS 4.0 vector indicates the attack can be performed remotely (AV:N), requires no privileges (PR:N), but does require user interaction (UI:A). The vulnerability does not impact confidentiality or availability significantly but has a low impact on integrity (VI:L). No known exploits have been reported in the wild, but the ease of exploitation and the lack of vendor support make this a notable risk. The vulnerability was published on September 30, 2025, with the initial reservation on July 24, 2025, by CERT-PL, indicating a recognized security concern within the Polish cybersecurity community.
Potential Impact
For European organizations, especially those in Poland and neighboring countries where PAD CMS is more likely to be deployed, this vulnerability poses a significant risk to user account integrity. Successful exploitation can lead to unauthorized password changes, resulting in account lockouts, unauthorized access, and potential further compromise of sensitive data or administrative functions within the CMS. Public sector organizations using the bip template, which is often used for official government websites in Poland, are particularly at risk. The inability to patch the vulnerability due to the product's End-Of-Life status increases the likelihood of exploitation over time. This can undermine trust in public-facing services, disrupt operations, and expose organizations to reputational damage and compliance issues under regulations such as GDPR if personal data is compromised. The requirement for user interaction means phishing or social engineering campaigns could be used to lure users to malicious sites, amplifying the threat.
Mitigation Recommendations
Given the lack of official patches, European organizations should implement compensating controls immediately. These include disabling or restricting access to the password reset functionality if feasible, especially on public-facing portals. Organizations should consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious POST requests targeting the password reset endpoints. Implementing CSRF tokens manually through custom development or middleware can help prevent unauthorized requests. User education campaigns to raise awareness about phishing and malicious links are critical to reduce the risk of user interaction exploitation. Additionally, organizations should plan for migration to a supported CMS platform with active security maintenance. Regular audits of user accounts and monitoring for unusual password changes or login attempts can help detect exploitation attempts early. Network segmentation and strict access controls around CMS administration interfaces can further reduce risk.
Affected Countries
Poland, Germany, Czech Republic, Slovakia, Lithuania
CVE-2025-8119: CWE-352 Cross-Site Request Forgery (CSRF) in Polska Akademia Dostępności PAD CMS
Description
CVE-2025-8119 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability affecting the password reset functionality of the Polska Akademia Dostępności (PAD) CMS. An attacker can craft a malicious website that, when visited by an authenticated user, triggers a POST request to change the user's password without their consent. This vulnerability affects all three templates of PAD CMS: www, bip, and www+bip. The product is End-Of-Life, and no patches will be released by the vendor. Exploitation does not require authentication but does require user interaction (visiting a malicious site). The CVSS 4. 0 base score is 5. 1, reflecting a medium impact primarily on integrity with limited impact on confidentiality and availability. No known exploits are currently in the wild. European organizations using PAD CMS are at risk, especially those with public-facing installations relying on these templates.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-8119 is a Cross-Site Request Forgery (CSRF) flaw in the password reset functionality of the Polska Akademia Dostępności (PAD) CMS, a content management system used primarily in Poland and possibly other European institutions. CSRF vulnerabilities allow attackers to perform unauthorized actions on behalf of authenticated users by tricking them into submitting forged requests. In this case, an attacker can create a specially crafted website that, when visited by a logged-in user of PAD CMS, automatically sends a POST request to the password reset endpoint, changing the victim's password to a value chosen by the attacker. This compromises the integrity of user accounts, potentially leading to account takeover. The vulnerability affects all three templates of PAD CMS: www, bip, and www+bip, indicating a widespread issue within the product. The product is End-Of-Life, meaning no official patches or updates will be provided by the vendor, Polska Akademia Dostępności, increasing the risk for users who continue to operate the software. The CVSS 4.0 vector indicates the attack can be performed remotely (AV:N), requires no privileges (PR:N), but does require user interaction (UI:A). The vulnerability does not impact confidentiality or availability significantly but has a low impact on integrity (VI:L). No known exploits have been reported in the wild, but the ease of exploitation and the lack of vendor support make this a notable risk. The vulnerability was published on September 30, 2025, with the initial reservation on July 24, 2025, by CERT-PL, indicating a recognized security concern within the Polish cybersecurity community.
Potential Impact
For European organizations, especially those in Poland and neighboring countries where PAD CMS is more likely to be deployed, this vulnerability poses a significant risk to user account integrity. Successful exploitation can lead to unauthorized password changes, resulting in account lockouts, unauthorized access, and potential further compromise of sensitive data or administrative functions within the CMS. Public sector organizations using the bip template, which is often used for official government websites in Poland, are particularly at risk. The inability to patch the vulnerability due to the product's End-Of-Life status increases the likelihood of exploitation over time. This can undermine trust in public-facing services, disrupt operations, and expose organizations to reputational damage and compliance issues under regulations such as GDPR if personal data is compromised. The requirement for user interaction means phishing or social engineering campaigns could be used to lure users to malicious sites, amplifying the threat.
Mitigation Recommendations
Given the lack of official patches, European organizations should implement compensating controls immediately. These include disabling or restricting access to the password reset functionality if feasible, especially on public-facing portals. Organizations should consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious POST requests targeting the password reset endpoints. Implementing CSRF tokens manually through custom development or middleware can help prevent unauthorized requests. User education campaigns to raise awareness about phishing and malicious links are critical to reduce the risk of user interaction exploitation. Additionally, organizations should plan for migration to a supported CMS platform with active security maintenance. Regular audits of user accounts and monitoring for unusual password changes or login attempts can help detect exploitation attempts early. Network segmentation and strict access controls around CMS administration interfaces can further reduce risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERT-PL
- Date Reserved
- 2025-07-24T14:23:32.250Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68dbac586e3c400c0ffa5e02
Added to database: 9/30/2025, 10:09:28 AM
Last enriched: 10/7/2025, 11:30:11 AM
Last updated: 11/14/2025, 5:12:33 AM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13161: CWE-23 Relative Path Traversal in IQ Service International IQ-Support
HighCVE-2025-13160: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in IQ Service International IQ-Support
MediumCVE-2025-9479: Out of bounds read in Google Chrome
UnknownCVE-2025-13107: Inappropriate implementation in Google Chrome
UnknownCVE-2025-13102: Inappropriate implementation in Google Chrome
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.