CVE-2025-40658

7.5 HIGH

📋 TL;DR

An Insecure Direct Object Reference (IDOR) vulnerability in DM Corporative CMS allows attackers to bypass authentication and access private admin areas by manipulating the 'option' parameter in /administer/selectionnode/framesSelection.asp. This affects all organizations using vulnerable versions of DM Corporative CMS.

💻 Affected Systems

Products:
  • DM Corporative CMS
Versions: All versions prior to the security patch
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects installations with the /administer/selectionnode/framesSelection.asp endpoint accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the CMS admin interface leading to data theft, content manipulation, or further system exploitation.

🟠

Likely Case

Unauthorized access to administrative functions, potentially allowing content modification, user data exposure, or configuration changes.

🟢

If Mitigated

Limited impact if proper authentication and authorization controls are implemented alongside the vulnerable endpoint.

🌐 Internet-Facing: HIGH - The vulnerability is exploitable via web requests and affects internet-facing CMS installations.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable but have reduced attack surface compared to internet-facing deployments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires simple HTTP requests with parameter manipulation; no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest security update from vendor

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-dm-corporative-cms-dmacroweb

Restart Required: Yes

Instructions:

1. Download the latest security patch from the vendor. 2. Apply the patch according to vendor instructions. 3. Restart the CMS service. 4. Verify the fix by testing the vulnerable endpoint.

🔧 Temporary Workarounds

Web Application Firewall Rule

all

Block or sanitize requests to /administer/selectionnode/framesSelection.asp with option parameter values 0, 1, or 2.

Access Restriction

all

Restrict access to the /administer/ directory to trusted IP addresses only.

🧯 If You Can't Patch

  • Implement strict authentication and authorization checks for all admin endpoints
  • Monitor and alert on unauthorized access attempts to /administer/selectionnode/framesSelection.asp

🔍 How to Verify

Check if Vulnerable:

Send HTTP requests to /administer/selectionnode/framesSelection.asp with option=0, option=1, and option=2 parameters. If you can access admin functions without proper authentication, the system is vulnerable.

Check Version:

Check CMS version through admin interface or configuration files as per vendor documentation.

Verify Fix Applied:

After patching, repeat the vulnerability check. Access should be denied or properly authenticated for the same requests.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /administer/selectionnode/framesSelection.asp with option parameter values 0, 1, or 2 from unauthorized sources
  • Failed authentication attempts followed by successful admin access

Network Indicators:

  • Unusual traffic patterns to admin endpoints
  • Requests with manipulated parameter values

SIEM Query:

source_ip NOT IN trusted_ips AND url_path CONTAINS '/administer/selectionnode/framesSelection.asp' AND (query_string CONTAINS 'option=0' OR query_string CONTAINS 'option=1' OR query_string CONTAINS 'option=2')

🔗 References

📤 Share & Export