CVE-2025-0482
Published: 15 January 2025
Summary
CVE-2025-0482 is a high-severity Use of Default Credentials (CWE-1392) vulnerability in Native-Php-Cms Project Native-Php-Cms. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Default Accounts (T1078.001); ranked at the 44.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-2 (Account Management) and IA-5 (Authenticator Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires changing default authenticators prior to first use, preventing remote exploitation of default credentials in /fladmin/user_recoverpwd.php.
Mandates management of accounts including creation, modification, disabling unnecessary accounts, and specifying password requirements to eliminate default credential usage.
Enforces secure configuration settings for system components, including remediation of vendor default credentials in the affected PHP CMS application.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Default credentials vulnerability on public-facing web admin endpoint directly enables Valid Accounts (Default Accounts) for Initial Access and exploitation of public-facing apps.
NVD Description
A vulnerability, which was classified as critical, was found in Fanli2012 native-php-cms 1.0. This affects an unknown part of the file /fladmin/user_recoverpwd.php. The manipulation leads to use of default credentials. It is possible to initiate the attack remotely. The exploit…
more
has been disclosed to the public and may be used.
Deeper analysisAI
CVE-2025-0482 is a vulnerability classified as critical in Fanli2012 native-php-cms version 1.0, affecting an unknown part of the file /fladmin/user_recoverpwd.php. The issue stems from the use of default credentials, as detailed in the CVE description published on 2025-01-15. It carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) and is associated with CWE-1392 and NVD-CWE-Other.
The vulnerability enables remote attackers with no privileges or user interaction to exploit the affected endpoint through manipulation, potentially leveraging default credentials for unauthorized access. Successful exploitation could result in low-level impacts to confidentiality, integrity, and availability.
Advisories reference GitHub issues at https://github.com/Fanli2012/native-php-cms/issues/4 and https://github.com/Fanli2012/native-php-cms/issues/4#issue-2769866348, along with VulDB entries including https://vuldb.com/?ctiid.291927, https://vuldb.com/?id.291927, and https://vuldb.com/?submit.475237. The exploit has been publicly disclosed and may be used.
Details
- CWE(s)