CVE-2025-8119
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-30

Last updated on: 2025-11-26

Assigner: CERT.PL

Description
PAD CMS is vulnerable to Cross-Site Request Forgery in reset password's functionality. Malicious attacker can craft special website, which when visited by the victim, will automatically send a POST request changing currently logged user's password to defined by the attacker value.Β This issue affects all 3 templates: www, bip and www+bip. This product is End-Of-Life and producent will not publish patches for this vulnerability.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-30
Last Modified
2025-11-26
Generated
2026-05-07
AI Q&A
2025-09-30
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
widzialni pad_cms to 1.2.1 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Cross-Site Request Forgery (CSRF) in the password reset functionality of PAD CMS. An attacker can create a malicious website that, when visited by a logged-in user, automatically sends a request to change that user's password to a value chosen by the attacker without the user's consent.


How can this vulnerability impact me? :

This vulnerability can allow an attacker to take over a user's account by changing their password without their knowledge. This can lead to unauthorized access to the user's account and potentially sensitive information or actions performed under that account.


What immediate steps should I take to mitigate this vulnerability?

Since PAD CMS is End-Of-Life and no patches will be released, immediate mitigation steps include disabling or restricting access to the password reset functionality, implementing strict CSRF protections such as requiring tokens or CAPTCHA on password reset forms, and educating users to avoid visiting untrusted websites while logged in. Additionally, consider migrating to a supported CMS to avoid unpatched vulnerabilities.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart