CVE-2025-63523
BaseFortify
Publication date: 2025-12-01
Last updated on: 2025-12-02
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| feehi | feehicms | 2.1.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
FeehiCMS version 2.1.1 does not properly enforce server-side immutability for parameters that are intended to be read-only on the client side. This means an authenticated attacker can intercept and modify these parameters during transmission, and the backend will accept these unauthorized changes. Specifically, this can allow unintended changes to usernames.
How can this vulnerability impact me? :
This vulnerability can allow an authenticated attacker to change usernames by modifying parameters that should be read-only. This could lead to unauthorized account modifications, potential impersonation, and disruption of user identity integrity within the system.