CVE-2025-8119
BaseFortify
Publication date: 2025-09-30
Last updated on: 2025-11-26
Assigner: CERT.PL
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| widzialni | pad_cms | to 1.2.1 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Cross-Site Request Forgery (CSRF) in the password reset functionality of PAD CMS. An attacker can create a malicious website that, when visited by a logged-in user, automatically sends a request to change that user's password to a value chosen by the attacker without the user's consent.
How can this vulnerability impact me? :
This vulnerability can allow an attacker to take over a user's account by changing their password without their knowledge. This can lead to unauthorized access to the user's account and potentially sensitive information or actions performed under that account.
What immediate steps should I take to mitigate this vulnerability?
Since PAD CMS is End-Of-Life and no patches will be released, immediate mitigation steps include disabling or restricting access to the password reset functionality, implementing strict CSRF protections such as requiring tokens or CAPTCHA on password reset forms, and educating users to avoid visiting untrusted websites while logged in. Additionally, consider migrating to a supported CMS to avoid unpatched vulnerabilities.