CVE-2025-63523
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-01

Last updated on: 2025-12-02

Assigner: MITRE

Description
FeehiCMS version 2.1.1 fails to enforce server-side immutability for parameters that are presented to clients as "read-only." An authenticated attacker can intercept and modify the parameter in transit and the backend accepts the changes. This can lead to unintended username changes.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-01
Last Modified
2025-12-02
Generated
2026-05-07
AI Q&A
2025-12-01
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
feehi feehicms 2.1.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-125 The product reads data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

FeehiCMS version 2.1.1 does not properly enforce server-side immutability for parameters that are intended to be read-only on the client side. This means an authenticated attacker can intercept and modify these parameters during transmission, and the backend will accept these unauthorized changes. Specifically, this can allow unintended changes to usernames.


How can this vulnerability impact me? :

This vulnerability can allow an authenticated attacker to change usernames by modifying parameters that should be read-only. This could lead to unauthorized account modifications, potential impersonation, and disruption of user identity integrity within the system.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart