CVE-2025-50904
Published: 20 August 2025
Summary
CVE-2025-50904 is a critical-severity Authentication Bypass Using an Alternate Path or Channel (CWE-288) vulnerability in Winterchens My-Site. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 29.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for logical access to protected resources like the /admin/ API, directly preventing authentication bypass exploits.
Explicitly authorizes and limits actions permitted without identification or authentication, ensuring the /admin/ API requires a token.
Mandates identification, reporting, and correction of flaws like this authentication bypass vulnerability in my-site, mitigating exploitation through timely patching.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Authentication bypass in public-facing web app directly enables remote exploitation for unauthorized admin access.
NVD Description
There is an authentication bypass vulnerability in WinterChenS my-site thru commit 6c79286 (2025-06-11). An attacker can exploit this vulnerability to access /admin/ API without any token.
Deeper analysisAI
CVE-2025-50904 is an authentication bypass vulnerability (CWE-288) in WinterChenS my-site through commit 6c79286 (2025-06-11). The flaw allows attackers to access the /admin/ API endpoint without any required authentication token. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting critical severity due to its network accessibility, low attack complexity, and lack of prerequisites.
Any unauthenticated attacker with network access to the vulnerable my-site instance can exploit this issue remotely without user interaction. Successful exploitation provides unauthorized access to the admin API, potentially enabling high-impact compromises to confidentiality, integrity, and availability, such as administrative actions or data manipulation.
Mitigation details are available in the GitHub issue at https://github.com/WinterChenS/my-site/issues/95. The CVE was published on 2025-08-20T17:15:36.683.
Details
- CWE(s)