CVE-2025-12868
Published: 10 November 2025
Summary
CVE-2025-12868 is a critical-severity Use of Client-Side Authentication (CWE-603) vulnerability in Org (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 48.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and IA-8 (Identification and Authentication (Non-organizational Users)).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces server-side access control policies, directly preventing attackers from gaining administrator privileges by modifying client-side authentication logic.
Requires server-side identification and authentication for non-organizational users, mitigating exploitation by unauthenticated remote attackers tampering with frontend code.
Implements protections for publicly accessible system components, countering risks from network-accessible frontend vulnerabilities exploited without authentication.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability allows unauthenticated remote attackers to modify frontend code of a public-facing web application to gain administrator privileges, directly mapping to exploitation of public-facing applications.
NVD Description
New Site Server developed by CyberTutor has a Use of Client-Side Authentication vulnerability, allowing unauthenticated remote attackers to modify the frontend code to gain administrator privileges on the website.
Deeper analysisAI
CVE-2025-12868, published on 2025-11-10, is a Use of Client-Side Authentication vulnerability (CWE-603) affecting New Site Server, a product developed by CyberTutor. The flaw enables unauthenticated remote attackers to modify frontend code, allowing them to gain administrator privileges on the website. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting critical severity due to its network-based exploitability with low complexity and high impacts across confidentiality, integrity, and availability.
Unauthenticated remote attackers with network access to a vulnerable New Site Server instance can exploit this issue without requiring privileges or user interaction. By altering the client-side authentication logic in the frontend code, they achieve administrator-level access, enabling full control over the website, such as data manipulation, unauthorized access to sensitive information, or further persistence.
Advisories from TWCERT/CC provide details on this vulnerability, accessible at https://www.twcert.org.tw/en/cp-139-10492-84a10-2.html and https://www.twcert.org.tw/tw/cp-132-10493-bf807-1.html. Security practitioners should review these references for recommended mitigations, including any available patches or configuration changes.
Details
- CWE(s)