CVE-2025-65900

6.5 MEDIUM

📋 TL;DR

CVE-2025-65900 is an incorrect access control vulnerability in Kalmia CMS that allows authenticated users with basic read permissions to retrieve sensitive information for all platform users. This affects all deployments running Kalmia CMS version 0.2.0. The vulnerability stems from insufficient permission validation and excessive data exposure in the backend API.

💻 Affected Systems

Products:
  • Kalmia CMS
Versions: 0.2.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with the vulnerable API endpoint enabled and accessible to authenticated users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete exposure of all user data including potentially sensitive personal information, credentials, or other confidential data stored in user profiles, leading to data breach and regulatory violations.

🟠

Likely Case

Unauthorized access to user information including names, email addresses, roles, and other profile data, enabling reconnaissance for further attacks or data harvesting.

🟢

If Mitigated

Limited exposure of non-sensitive user metadata if proper data classification and minimal data exposure principles are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but with only basic read permissions. The vulnerability is straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Monitor the Kalmia CMS repository for updates and apply when available.

🔧 Temporary Workarounds

API Endpoint Restriction

all

Restrict access to the vulnerable /kal-api/auth/users endpoint using web server configuration or application firewall rules.

# For nginx: location /kal-api/auth/users { deny all; }
# For Apache: <Location /kal-api/auth/users> Require all denied </Location>

Authentication Enhancement

all

Implement additional permission checks in the application layer to validate user authorization before returning sensitive data.

# Modify the API endpoint to include proper permission validation

🧯 If You Can't Patch

  • Implement network segmentation to isolate the Kalmia CMS instance and restrict access to trusted users only.
  • Enable detailed logging and monitoring for access to the /kal-api/auth/users endpoint to detect exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Authenticate to the Kalmia CMS with a basic user account and attempt to access /kal-api/auth/users endpoint. If it returns data for all users without proper authorization, the system is vulnerable.

Check Version:

Check the CMS version in the admin panel or configuration files. For Kalmia CMS 0.2.0, the vulnerability exists.

Verify Fix Applied:

After applying workarounds, attempt the same access with a basic user account. The endpoint should return an authorization error or no data.

📡 Detection & Monitoring

Log Indicators:

  • Multiple GET requests to /kal-api/auth/users from single user accounts
  • Unusual data retrieval patterns from the users API endpoint

Network Indicators:

  • HTTP requests to /kal-api/auth/users from non-admin users
  • Large data transfers from the users endpoint

SIEM Query:

source="web_server" AND uri="/kal-api/auth/users" AND user_role!="admin" AND response_size>1000

🔗 References

📤 Share & Export