CVE-2025-63523

6.5 MEDIUM

📋 TL;DR

FeehiCMS version 2.1.1 has a server-side validation flaw where parameters marked as read-only on the client side can be modified by authenticated attackers during transmission. This allows attackers to change usernames they shouldn't have access to modify. The vulnerability affects all FeehiCMS 2.1.1 installations with authenticated user access.

💻 Affected Systems

Products:
  • FeehiCMS
Versions: 2.1.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access. The vulnerability exists in the default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could escalate privileges by changing administrative usernames, potentially leading to account takeover and full system compromise.

🟠

Likely Case

Authenticated users can modify other users' usernames, causing account confusion, potential privilege escalation, and data integrity issues.

🟢

If Mitigated

With proper input validation and server-side checks, the impact is limited to failed modification attempts with appropriate logging.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward using standard web proxy tools to modify parameters in transit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.2 or later

Vendor Advisory: https://github.com/liufee/cms/issues/77

Restart Required: No

Instructions:

1. Backup your current installation. 2. Download FeehiCMS version 2.1.2 or later from the official repository. 3. Replace affected files with patched versions. 4. Verify the fix by testing username modification functionality.

🔧 Temporary Workarounds

Implement Server-Side Validation

all

Add server-side validation to check if users have permission to modify specific parameters before processing changes.

Modify user management controllers to validate parameter immutability server-side

Web Application Firewall Rules

all

Configure WAF to block parameter tampering attempts on user modification endpoints.

Add WAF rules to detect and block unexpected parameter modifications in POST/PUT requests

🧯 If You Can't Patch

  • Restrict user modification functionality to administrators only
  • Implement additional authentication factors for sensitive user operations

🔍 How to Verify

Check if Vulnerable:

Test if authenticated users can modify read-only parameters by intercepting requests with tools like Burp Suite or OWASP ZAP.

Check Version:

Check the version.php file or admin panel for version information

Verify Fix Applied:

Attempt the same parameter modification after patching; server should reject unauthorized changes with proper error messages.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed username modification attempts
  • Unauthorized parameter modification in user management logs

Network Indicators:

  • Unusual POST/PUT requests to user modification endpoints with modified parameters

SIEM Query:

source="web_logs" AND (uri_path="/admin/user/update" OR uri_path="/user/modify") AND (status_code=200 OR status_code=302) AND parameter_tampering_detected=true

🔗 References

📤 Share & Export