CVE-2025-15455
Unknown Unknown - Not Provided
Improper Authentication in bg5sbk MiniCMS delete_page Function

Publication date: 2026-01-05

Last updated on: 2026-04-29

Assigner: VulDB

Description
A flaw has been found in bg5sbk MiniCMS up to 1.8. Impacted is the function delete_page of the file /minicms/mc-admin/page.php of the component File Recovery Request Handler. This manipulation causes improper authentication. The attack is possible to be carried out remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-05
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-01-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
bg5sbk minicms to 1.8 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-287 When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-15455 is an improper authentication vulnerability in bg5sbk MiniCMS versions up to 1.8, specifically in the delete_page function of the /minicms/mc-admin/page.php file. This flaw allows attackers to remotely delete published pages without any authentication by exploiting the lack of permission verification. The deleted pages are moved to a recycle bin, but unauthorized deletion can disrupt website content and functionality. The vulnerability is easy to exploit, with a proof-of-concept publicly available, and no vendor patch or mitigation currently exists. [1, 2, 3]


How can this vulnerability impact me? :

This vulnerability can severely impact you by allowing attackers to delete important website pages such as basic information, user comments, core business pages, and data statistics without authentication. This leads to content gaps, functional failures, compromised user experience, service interruptions, user attrition, financial losses, and potential data manipulation or malicious code implantation. Recovery from such deletions is resource-intensive and may be irreversible, causing long-term damage to your website and business operations. [2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by searching for the presence of the vulnerable MiniCMS admin page, specifically by looking for URLs containing 'minicms/mc-admin/page.php'. Attackers may use Google dorking with the query 'inurl:minicms/mc-admin/page.php' to locate vulnerable targets. On your system or network, you can monitor HTTP requests for unauthorized deletion attempts targeting this endpoint. For example, you can use network monitoring tools or web server logs to detect suspicious GET or POST requests to '/minicms/mc-admin/page.php' that attempt to invoke the delete_page function without proper authentication. Specific commands might include using grep on web server logs: `grep 'minicms/mc-admin/page.php' /var/log/apache2/access.log` or using network capture tools like tcpdump or Wireshark to filter HTTP requests to this path. However, no specific detection commands are provided in the resources. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: 1) Implementing permission verification before executing the delete_page function, such as checking login status and validating the mc_token cookie. 2) Validating deletion parameters to restrict allowed page IDs and prevent injection attacks. 3) Changing deletion requests from GET to POST and adding CSRF token verification to prevent unauthorized requests. 4) Enhancing source code security with multi-level permission checks before deleting pages or unlinking files. 5) Promptly updating to the latest stable MiniCMS version that addresses this and other vulnerabilities. If no patch is available, consider restricting access to the vulnerable admin pages via network controls or switching to alternative CMS solutions. [2]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided resources do not explicitly discuss the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA. However, given that the vulnerability allows unauthorized deletion of website pages, including potentially critical business and user-related content, it could indirectly affect compliance by compromising data integrity, availability, and potentially user data protection obligations. No direct references to regulatory compliance impacts or guidance are provided. [1, 2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart