CVE-2025-54174
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-20

Last updated on: 2025-09-08

Assigner: CERT.PL

Description
QuickCMS is vulnerable to Cross-Site Request Forgery in article creation functionality. Malicious attacker can craft special website, which when visited by the admin, will automatically send a POST request creating a malicious article with content defined by the attacker. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.8 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-20
Last Modified
2025-09-08
Generated
2026-05-07
AI Q&A
2025-08-20
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
opensolution quick.cms 6.8
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Cross-Site Request Forgery (CSRF) in QuickCMS's article creation functionality. An attacker can create a malicious website that, when visited by an admin user, automatically sends a POST request to QuickCMS to create an article with attacker-defined content without the admin's consent.


How can this vulnerability impact me? :

This vulnerability can allow an attacker to inject malicious or unauthorized content into the CMS by tricking an admin into visiting a crafted website. This can lead to misinformation, defacement, or potentially further exploitation if the malicious content includes harmful scripts or links.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, avoid visiting untrusted websites while logged in as an admin to QuickCMS version 6.8. Implement CSRF protection mechanisms such as CSRF tokens in the article creation functionality. If possible, update or patch QuickCMS once a fix is available from the vendor. Restrict admin access and monitor for suspicious POST requests creating articles.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart