CVE-2025-0484
Published: 15 January 2025
Summary
CVE-2025-0484 is a high-severity Incorrect Privilege Assignment (CWE-266) vulnerability in Fanli2012 Native-Php-Cms. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 29.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and CM-5 (Access Restrictions for Change).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for access to backend resources like sysconfig_doedit.php, directly preventing improper authorization exploitation.
Restricts access to system configuration changes to authorized users only, mitigating unauthorized manipulation of the vulnerable sysconfig_doedit.php endpoint.
Applies least privilege to limit the scope of actions possible even if authorization checks in the backend fail.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Improper authorization in a publicly accessible backend PHP script enables remote unauthenticated exploitation of a web application.
NVD Description
A vulnerability was found in Fanli2012 native-php-cms 1.0 and classified as critical. This issue affects some unknown processing of the file /fladmin/sysconfig_doedit.php of the component Backend. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit…
more
has been disclosed to the public and may be used.
Deeper analysisAI
CVE-2025-0484 is a critical improper authorization vulnerability (CWE-266, CWE-285) in Fanli2012 native-php-cms version 1.0. The issue resides in the Backend component, specifically the unknown processing of the file /fladmin/sysconfig_doedit.php, which allows manipulation leading to improper authorization.
The vulnerability can be exploited remotely by unauthenticated attackers over the network with low attack complexity and no user interaction required, per its CVSS 3.1 score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). Successful exploitation enables limited impacts on confidentiality, integrity, and availability.
Advisories referenced in VulDB entries and GitHub issues for the native-php-cms repository (e.g., https://github.com/Fanli2012/native-php-cms/issues/6) confirm the vulnerability details, noting that an exploit has been publicly disclosed and may be used. No patches or specific mitigations are detailed in the provided references.
Details
- CWE(s)