CVE-2023-53923
Published: 17 December 2025
Summary
CVE-2023-53923 is a critical-severity Missing Authorization (CWE-862) vulnerability in Ulicms Ulicms. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 41.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-2 (Account Management) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for access to system resources, directly addressing the missing authorization in UserController that permits unauthenticated admin account creation.
Manages system accounts including provisioning new accounts with proper authorization, preventing unauthenticated attackers from creating administrative accounts.
Protects public access interfaces by requiring identification and authentication, mitigating exploitation of the publicly accessible /dist/admin/index.php endpoint.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability enables unauthenticated exploitation of a public-facing web application (T1190) via crafted POST request lacking authorization, directly creating a new administrative account (T1136.001) and achieving privilege escalation to full system access (T1068).
NVD Description
UliCMS 2023.1 contains a privilege escalation vulnerability that allows unauthenticated attackers to create administrative accounts through the UserController endpoint. Attackers can send a crafted POST request to /dist/admin/index.php with specific parameters to generate a new admin user with full system…
more
access.
Deeper analysisAI
CVE-2023-53923 is a privilege escalation vulnerability in UliCMS version 2023.1, stemming from CWE-862 (Missing Authorization). The flaw resides in the UserController endpoint, where unauthenticated attackers can send a crafted POST request to /dist/admin/index.php with specific parameters to create a new administrative account, granting full system access.
Unauthenticated remote attackers can exploit this vulnerability over the network with low attack complexity, no required privileges, and no user interaction, as indicated by its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Successful exploitation enables attackers to generate admin users, achieving high impacts on confidentiality, integrity, and availability through complete administrative control.
Advisories such as the VulnCheck report and Exploit-DB entry (ID 51433) document the issue, including a public proof-of-concept exploit demonstrating the unauthenticated admin account creation. No patch or mitigation details are specified in the CVE description.
Details
- CWE(s)