CVE-2025-53897

6.8 MEDIUM

📋 TL;DR

This Cross-Site Request Forgery (CSRF) vulnerability in Kiteworks MFT allows attackers to trick administrators into browsing malicious pages, potentially exposing sensitive log information. All Kiteworks MFT installations prior to version 9.1.0 are affected. The attack requires administrator interaction but could lead to information disclosure.

💻 Affected Systems

Products:
  • Kiteworks MFT
Versions: All versions prior to 9.1.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator interaction with malicious content; default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to sensitive system logs containing operational data, user information, or potentially credentials, leading to further system compromise or data exfiltration.

🟠

Likely Case

Limited information disclosure from logs, potentially revealing system configuration details or user activity that could aid in further attacks.

🟢

If Mitigated

No impact if administrators avoid suspicious links and proper access controls are in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to trick administrators into visiting malicious pages; no public exploit code is known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.1.0

Vendor Advisory: https://github.com/kiteworks/security-advisories/security/advisories/GHSA-cxwc-7899-3h4m

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Download Kiteworks MFT version 9.1.0 or later from official sources. 3. Follow vendor upgrade documentation. 4. Restart services after upgrade. 5. Verify functionality.

🔧 Temporary Workarounds

Administrator Security Training

all

Train administrators to avoid clicking suspicious links and verify URLs before accessing administrative interfaces.

Network Segmentation

all

Restrict administrative access to trusted networks only, reducing exposure to external attackers.

🧯 If You Can't Patch

  • Implement strict access controls limiting administrative interface access to trusted IP addresses only.
  • Deploy web application firewalls (WAF) with CSRF protection rules and monitor for suspicious administrative access patterns.

🔍 How to Verify

Check if Vulnerable:

Check Kiteworks MFT version via administrative interface or configuration files; versions below 9.1.0 are vulnerable.

Check Version:

Check via Kiteworks administrative dashboard or review installation documentation for version verification methods.

Verify Fix Applied:

Confirm version is 9.1.0 or higher in administrative interface and test administrative functions for proper CSRF protection.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrative access from unexpected IP addresses
  • Multiple failed login attempts followed by successful log access

Network Indicators:

  • HTTP requests to log endpoints with suspicious referrer headers
  • CSRF token validation failures in web server logs

SIEM Query:

source="kiteworks" AND (event="admin_access" OR event="log_access") AND src_ip NOT IN trusted_ips

🔗 References

📤 Share & Export