CVE-2025-67165

9.8 CRITICAL

📋 TL;DR

An Insecure Direct Object Reference (IDOR) vulnerability in Pagekit CMS v1.0.18 allows attackers to manipulate object references (like user IDs) to escalate privileges. This affects all Pagekit CMS installations running the vulnerable version, potentially enabling attackers to gain administrative access.

💻 Affected Systems

Products:
  • Pagekit CMS
Versions: v1.0.18
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of Pagekit CMS v1.0.18 are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control over the CMS, allowing them to modify content, install malicious plugins, access sensitive data, and potentially compromise the underlying server.

🟠

Likely Case

Attackers escalate privileges to administrator level, enabling content manipulation, user account takeover, and installation of backdoors.

🟢

If Mitigated

With proper access controls and input validation, the impact is limited to unauthorized access only to resources the attacker already has some permissions for.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires at least low-privilege user access. The vulnerability is in the user management interface where object references can be manipulated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Check for official patch from Pagekit CMS developers
2. If patch available, download and apply according to vendor instructions
3. Verify the fix by testing privilege escalation attempts

🔧 Temporary Workarounds

Implement Access Control Validation

all

Add server-side validation to ensure users can only access objects they're authorized for

Modify user management PHP files to include proper authorization checks before processing object references

Restrict User Management Interface

all

Limit access to user management functionality to trusted IP addresses only

Add IP-based restrictions in .htaccess or web server configuration for /admin/user paths

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) rules to detect and block IDOR patterns
  • Enable detailed logging of all user management actions and monitor for suspicious privilege changes

🔍 How to Verify

Check if Vulnerable:

Check if running Pagekit CMS v1.0.18 by examining the version in admin panel or checking composer.json

Check Version:

Check admin panel or examine composer.json for version information

Verify Fix Applied:

Test privilege escalation attempts using known vulnerable endpoints with proper authorization

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed privilege escalation attempts
  • Unauthorized access to user management endpoints
  • Sudden privilege changes for user accounts

Network Indicators:

  • Unusual patterns of requests to user management API endpoints
  • Requests manipulating user ID parameters

SIEM Query:

source="web_logs" AND (uri_path="/admin/user*" OR uri_path="/api/user*") AND (status_code=200 OR status_code=403) AND user_agent NOT IN ("trusted_bots")

🔗 References

📤 Share & Export