CVE-2025-5033

4.3 MEDIUM

📋 TL;DR

This CSRF vulnerability in TeaCMS 2.0.2 allows attackers to trick authenticated administrators into performing unauthorized actions via the user management interface. Attackers can remotely exploit this to create new user accounts with administrative privileges. Only TeaCMS installations with the vulnerable version are affected.

💻 Affected Systems

Products:
  • XiaoBingby TeaCMS
Versions: 2.0.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator authentication to exploit, but default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers create administrative user accounts, gaining full control over the CMS to modify content, steal data, or deploy further attacks.

🟠

Likely Case

Attackers create backdoor user accounts with elevated privileges to maintain persistent access for future exploitation.

🟢

If Mitigated

With proper CSRF protections, exploitation attempts fail, preventing unauthorized user creation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly disclosed, making weaponization straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://gitee.com/xiaobingby/TeaCMS/issues/IBYRPK

Restart Required: No

Instructions:

No official patch available. Monitor vendor repository for updates and apply when released.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add CSRF protection to the UserManageController.addUser endpoint

Modify src/main/java/me/teacms/controller/admin/UserManageController.java to include CSRF token validation

Disable User Management Interface

all

Temporarily disable the vulnerable user management functionality

Comment out or remove the addUser endpoint mapping in controller

🧯 If You Can't Patch

  • Implement WAF rules to block CSRF attacks targeting the /admin/user/add endpoint
  • Require re-authentication for sensitive administrative actions like user creation

🔍 How to Verify

Check if Vulnerable:

Check if TeaCMS version is 2.0.2 and if the UserManageController.addUser endpoint lacks CSRF protection

Check Version:

Check application.properties or build files for version information

Verify Fix Applied:

Test that CSRF tokens are required for the addUser endpoint and validate they are properly checked

📡 Detection & Monitoring

Log Indicators:

  • Multiple user creation requests from same IP without corresponding admin login
  • User creation requests missing CSRF tokens

Network Indicators:

  • POST requests to /admin/user/add without Referer header validation
  • CSRF attack patterns in web traffic

SIEM Query:

source="web_logs" AND uri="/admin/user/add" AND NOT csrf_token=*

🔗 References

📤 Share & Export