CVE-2025-2638
📋 TL;DR
This vulnerability in JIZHICMS allows improper authorization through manipulation of the 'ishot' parameter in the Article Handler component. Attackers can exploit this remotely to bypass access controls. All JIZHICMS installations up to version 1.7.0 are affected.
💻 Affected Systems
- JIZHICMS
📦 What is this software?
Jizhicms by Jizhicms
⚠️ Risk & Real-World Impact
Worst Case
Unauthorized users could modify article settings, publish unauthorized content, or potentially escalate privileges within the CMS.
Likely Case
Attackers bypass authorization checks to manipulate article properties without proper permissions.
If Mitigated
With proper access controls and input validation, impact is limited to failed authorization attempts.
🎯 Exploit Status
Exploit details are publicly available in GitHub repositories. Attack requires some level of access to the CMS interface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None known
Restart Required: No
Instructions:
No official patch available. Upgrade to version beyond 1.7.0 if available, or apply workarounds.
🔧 Temporary Workarounds
Input Validation Filter
allAdd server-side validation for the 'ishot' parameter to ensure only authorized values are accepted.
Modify /user/release.html to validate ishot parameter against user permissions
Access Control Middleware
allImplement middleware that checks user permissions before processing Article Handler requests.
Add authentication check in the Article Handler component
🧯 If You Can't Patch
- Restrict access to /user/release.html endpoint using web application firewall rules
- Implement network segmentation to isolate JIZHICMS from sensitive systems
🔍 How to Verify
Check if Vulnerable:
Check if JIZHICMS version is ≤1.7.0 and test /user/release.html endpoint with ishot=1 parameter manipulation.
Check Version:
Check JIZHICMS version in admin panel or configuration files
Verify Fix Applied:
Test that unauthorized users cannot manipulate article settings via the ishot parameter.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /user/release.html with ishot parameter
- Failed authorization attempts in CMS logs
Network Indicators:
- HTTP requests to /user/release.html with parameter manipulation
SIEM Query:
web.url:*release.html AND web.param.ishot:*
🔗 References
- https://github.com/H3rmesk1t/vulnerability-paper/blob/main/jizhiCMS-1.7.0-Incorrect%20Access%20Control2.md
- https://vuldb.com/?ctiid.300639
- https://vuldb.com/?id.300639
- https://vuldb.com/?submit.519633
- https://github.com/H3rmesk1t/vulnerability-paper/blob/main/jizhiCMS-1.7.0-Incorrect%20Access%20Control2.md