CVE-2025-3979

4.3 MEDIUM

📋 TL;DR

This CSRF vulnerability in dazhouda lecms 3.0.3 allows attackers to trick authenticated users into unknowingly changing their passwords via malicious requests to the password change handler. Attackers can exploit this remotely to compromise user accounts. Only lecms 3.0.3 installations with the vulnerable component are affected.

💻 Affected Systems

Products:
  • dazhouda lecms
Versions: 3.0.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations using the vulnerable password change handler component at /index.php?my-password-ajax-1.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could change administrator passwords, gaining full control over the CMS and potentially the underlying server if privileged accounts are compromised.

🟠

Likely Case

Attackers trick users into changing their own passwords, then use those credentials to access user accounts for data theft, privilege escalation, or further attacks.

🟢

If Mitigated

With proper CSRF protections, the attack fails, and user accounts remain secure with no unauthorized password changes.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires the victim to be authenticated and tricked into visiting a malicious page. The exploit is publicly disclosed and relatively simple to implement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available, or implement CSRF protections manually.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add CSRF token validation to the password change handler to ensure requests originate from legitimate sources.

Modify /index.php?my-password-ajax-1 to include and validate CSRF tokens in POST requests.

Disable Vulnerable Endpoint

all

Temporarily disable or restrict access to the vulnerable password change handler until a fix is available.

Add access control rules to block /index.php?my-password-ajax-1 or restrict it to trusted IPs.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block CSRF attacks targeting the vulnerable endpoint.
  • Educate users about phishing risks and encourage them to use separate browser sessions for sensitive actions.

🔍 How to Verify

Check if Vulnerable:

Check if your lecms installation is version 3.0.3 and has the /index.php?my-password-ajax-1 endpoint without CSRF protection.

Check Version:

Check lecms configuration files or admin panel for version information.

Verify Fix Applied:

Test the password change functionality with and without valid CSRF tokens to ensure unauthorized requests are rejected.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed password change attempts from different IPs, or successful changes without corresponding user actions.

Network Indicators:

  • Unusual POST requests to /index.php?my-password-ajax-1 from unexpected referrers or without CSRF tokens.

SIEM Query:

Search for POST requests to /index.php?my-password-ajax-1 with suspicious referrer headers or from known malicious IPs.

🔗 References

📤 Share & Export