CVE-2025-53900

6.5 MEDIUM

📋 TL;DR

CVE-2025-53900 is a privilege escalation vulnerability in Kiteworks MFT where authorized users can gain elevated permissions through improper role definitions in Connections management. This affects all Kiteworks MFT deployments before version 9.1.0 where users have access to manage Connections.

💻 Affected Systems

Products:
  • Kiteworks MFT
Versions: All versions prior to 9.1.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user to have some level of existing access to the Kiteworks MFT system with permissions to manage Connections.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authorized users could gain administrative privileges, potentially accessing sensitive data, modifying configurations, or disrupting file transfer workflows.

🟠

Likely Case

Users with existing permissions could escalate to perform unauthorized actions within their scope of access, such as modifying connections they shouldn't control.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to authorized users gaining slightly elevated permissions within their existing access scope.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of the role/permission system. The advisory suggests it's relatively straightforward for authorized users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.1.0

Vendor Advisory: https://github.com/kiteworks/security-advisories/security/advisories/GHSA-gjq3-8v6p-2h6h

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Download Kiteworks MFT version 9.1.0 or later from official sources. 3. Follow vendor upgrade documentation for your deployment type. 4. Restart services after upgrade. 5. Verify functionality post-upgrade.

🔧 Temporary Workarounds

Restrict Connection Management Permissions

all

Temporarily remove or restrict permissions for managing Connections from non-administrative users until patching can be completed.

Enhanced Monitoring of Connection Changes

all

Implement additional logging and alerting for any Connection management activities by non-administrative users.

🧯 If You Can't Patch

  • Implement strict role-based access control with minimal necessary permissions for Connection management
  • Enable detailed audit logging for all Connection-related activities and review logs regularly

🔍 How to Verify

Check if Vulnerable:

Check Kiteworks MFT version via admin interface or configuration files. If version is below 9.1.0, the system is vulnerable.

Check Version:

Check admin dashboard or configuration files for version information specific to your deployment method.

Verify Fix Applied:

After upgrading, verify version is 9.1.0 or higher and test that users cannot escalate privileges through Connection management.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized or unexpected Connection creation/modification
  • User permission changes related to Connection management
  • Failed privilege escalation attempts in audit logs

Network Indicators:

  • Unusual patterns of Connection management API calls from non-admin users

SIEM Query:

source="kiteworks" AND (event_type="connection_modified" OR event_type="permission_change") AND user_role!="admin"

🔗 References

📤 Share & Export