Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8119: CWE-352 Cross-Site Request Forgery (CSRF) in Polska Akademia Dostępności PAD CMS

0
Medium
VulnerabilityCVE-2025-8119cvecve-2025-8119cwe-352
Published: Tue Sep 30 2025 (09/30/2025, 10:04:54 UTC)
Source: CVE Database V5
Vendor/Project: Polska Akademia Dostępności
Product: PAD CMS

Description

CVE-2025-8119 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability affecting the password reset functionality of the Polska Akademia Dostępności (PAD) CMS. An attacker can craft a malicious website that, when visited by an authenticated user, triggers a POST request to change the user's password without their consent. This vulnerability affects all three templates of PAD CMS: www, bip, and www+bip. The product is End-Of-Life, and no patches will be released by the vendor. Exploitation does not require authentication but does require user interaction (visiting a malicious site). The CVSS 4. 0 base score is 5. 1, reflecting a medium impact primarily on integrity with limited impact on confidentiality and availability. No known exploits are currently in the wild. European organizations using PAD CMS are at risk, especially those with public-facing installations relying on these templates.

AI-Powered Analysis

AILast updated: 10/07/2025, 11:30:11 UTC

Technical Analysis

The vulnerability identified as CVE-2025-8119 is a Cross-Site Request Forgery (CSRF) flaw in the password reset functionality of the Polska Akademia Dostępności (PAD) CMS, a content management system used primarily in Poland and possibly other European institutions. CSRF vulnerabilities allow attackers to perform unauthorized actions on behalf of authenticated users by tricking them into submitting forged requests. In this case, an attacker can create a specially crafted website that, when visited by a logged-in user of PAD CMS, automatically sends a POST request to the password reset endpoint, changing the victim's password to a value chosen by the attacker. This compromises the integrity of user accounts, potentially leading to account takeover. The vulnerability affects all three templates of PAD CMS: www, bip, and www+bip, indicating a widespread issue within the product. The product is End-Of-Life, meaning no official patches or updates will be provided by the vendor, Polska Akademia Dostępności, increasing the risk for users who continue to operate the software. The CVSS 4.0 vector indicates the attack can be performed remotely (AV:N), requires no privileges (PR:N), but does require user interaction (UI:A). The vulnerability does not impact confidentiality or availability significantly but has a low impact on integrity (VI:L). No known exploits have been reported in the wild, but the ease of exploitation and the lack of vendor support make this a notable risk. The vulnerability was published on September 30, 2025, with the initial reservation on July 24, 2025, by CERT-PL, indicating a recognized security concern within the Polish cybersecurity community.

Potential Impact

For European organizations, especially those in Poland and neighboring countries where PAD CMS is more likely to be deployed, this vulnerability poses a significant risk to user account integrity. Successful exploitation can lead to unauthorized password changes, resulting in account lockouts, unauthorized access, and potential further compromise of sensitive data or administrative functions within the CMS. Public sector organizations using the bip template, which is often used for official government websites in Poland, are particularly at risk. The inability to patch the vulnerability due to the product's End-Of-Life status increases the likelihood of exploitation over time. This can undermine trust in public-facing services, disrupt operations, and expose organizations to reputational damage and compliance issues under regulations such as GDPR if personal data is compromised. The requirement for user interaction means phishing or social engineering campaigns could be used to lure users to malicious sites, amplifying the threat.

Mitigation Recommendations

Given the lack of official patches, European organizations should implement compensating controls immediately. These include disabling or restricting access to the password reset functionality if feasible, especially on public-facing portals. Organizations should consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious POST requests targeting the password reset endpoints. Implementing CSRF tokens manually through custom development or middleware can help prevent unauthorized requests. User education campaigns to raise awareness about phishing and malicious links are critical to reduce the risk of user interaction exploitation. Additionally, organizations should plan for migration to a supported CMS platform with active security maintenance. Regular audits of user accounts and monitoring for unusual password changes or login attempts can help detect exploitation attempts early. Network segmentation and strict access controls around CMS administration interfaces can further reduce risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERT-PL
Date Reserved
2025-07-24T14:23:32.250Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68dbac586e3c400c0ffa5e02

Added to database: 9/30/2025, 10:09:28 AM

Last enriched: 10/7/2025, 11:30:11 AM

Last updated: 11/14/2025, 5:12:33 AM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats