Cyber Posture

CVE-2025-67165

CriticalPublic PoC

Published: 17 December 2025

Published
17 December 2025
Modified
02 January 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0011 28.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-67165 is a critical-severity Authorization Bypass Through User-Controlled Key (CWE-639) vulnerability in Pagekit Pagekit. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 28.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-3 enforces approved authorizations for access to information and resources, directly preventing IDOR exploitation by requiring validation of direct object references against user privileges in Pagekit CMS.

prevent

AC-6 applies least privilege to restrict user access to only necessary permissions, mitigating privilege escalation resulting from the IDOR vulnerability.

prevent

SI-10 validates inputs such as object IDs, reducing the risk of manipulation leading to unauthorized privilege escalation via IDOR in the CMS.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

CVE-2025-67165 is an IDOR in a public-facing CMS exploitable unauthenticated remotely (T1190), enabling privilege escalation via software vulnerability exploitation (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

An Insecure Direct Object Reference (IDOR) in Pagekit CMS v1.0.18 allows attackers to escalate privileges.

Deeper analysisAI

CVE-2025-67165 is an Insecure Direct Object Reference (IDOR) vulnerability, mapped to CWE-639, affecting Pagekit CMS version 1.0.18. Published on 2025-12-17, it enables attackers to escalate privileges through improper handling of direct object references within the CMS.

The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), making it exploitable by unauthenticated attackers over the network with low complexity and no user interaction required. Successful exploitation allows privilege escalation, granting high-impact access to confidential data (C:H), integrity modifications (I:H), and availability disruptions (A:H) without changing the scope.

Mitigation details and further analysis are available in the referenced advisories, including the vulnerability research repository at https://github.com/mbiesiad/vulnerability-research/tree/main/CVE-2025-67165, Pagekit documentation on user permissions (https://github.com/pagekit/docs/blob/develop/user-interface/users.md#permissions) and roles (https://github.com/pagekit/docs/blob/develop/user-interface/users.md#roles), and the official Pagekit repository (https://github.com/pagekit/pagekit).

Details

CWE(s)

Affected Products

pagekit
pagekit
1.0.18

CVEs Like This One

CVE-2025-67164Same product: Pagekit Pagekit
CVE-2025-5947Shared CWE-639
CVE-2025-69274Shared CWE-639
CVE-2025-15018Shared CWE-639
CVE-2025-5948Shared CWE-639
CVE-2025-14996Shared CWE-639
CVE-2025-7347Shared CWE-639
CVE-2025-0352Shared CWE-639
CVE-2025-9062Shared CWE-639
CVE-2025-69347Shared CWE-639

References