Cyber Posture

CVE-2025-12868

Critical

Published: 10 November 2025

Published
10 November 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0028 51.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-12868 is a critical-severity Use of Client-Side Authentication (CWE-603) vulnerability in Org (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 48.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and IA-8 (Identification and Authentication (Non-organizational Users)).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces server-side access control policies, directly preventing attackers from gaining administrator privileges by modifying client-side authentication logic.

prevent

Requires server-side identification and authentication for non-organizational users, mitigating exploitation by unauthenticated remote attackers tampering with frontend code.

prevent

Implements protections for publicly accessible system components, countering risks from network-accessible frontend vulnerabilities exploited without authentication.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability allows unauthenticated remote attackers to modify frontend code of a public-facing web application to gain administrator privileges, directly mapping to exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

New Site Server developed by CyberTutor has a Use of Client-Side Authentication vulnerability, allowing unauthenticated remote attackers to modify the frontend code to gain administrator privileges on the website.

Deeper analysisAI

CVE-2025-12868, published on 2025-11-10, is a Use of Client-Side Authentication vulnerability (CWE-603) affecting New Site Server, a product developed by CyberTutor. The flaw enables unauthenticated remote attackers to modify frontend code, allowing them to gain administrator privileges on the website. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting critical severity due to its network-based exploitability with low complexity and high impacts across confidentiality, integrity, and availability.

Unauthenticated remote attackers with network access to a vulnerable New Site Server instance can exploit this issue without requiring privileges or user interaction. By altering the client-side authentication logic in the frontend code, they achieve administrator-level access, enabling full control over the website, such as data manipulation, unauthorized access to sensitive information, or further persistence.

Advisories from TWCERT/CC provide details on this vulnerability, accessible at https://www.twcert.org.tw/en/cp-139-10492-84a10-2.html and https://www.twcert.org.tw/tw/cp-132-10493-bf807-1.html. Security practitioners should review these references for recommended mitigations, including any available patches or configuration changes.

Details

CWE(s)

Affected Products

Org
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-24517Shared CWE-603
CVE-2026-1363Shared CWE-603
CVE-2025-61940Shared CWE-603
CVE-2025-30042Shared CWE-603

References