CVE-2025-67165
Published: 17 December 2025
Summary
CVE-2025-67165 is a critical-severity Authorization Bypass Through User-Controlled Key (CWE-639) vulnerability in Pagekit Pagekit. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 28.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
AC-3 enforces approved authorizations for access to information and resources, directly preventing IDOR exploitation by requiring validation of direct object references against user privileges in Pagekit CMS.
AC-6 applies least privilege to restrict user access to only necessary permissions, mitigating privilege escalation resulting from the IDOR vulnerability.
SI-10 validates inputs such as object IDs, reducing the risk of manipulation leading to unauthorized privilege escalation via IDOR in the CMS.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE-2025-67165 is an IDOR in a public-facing CMS exploitable unauthenticated remotely (T1190), enabling privilege escalation via software vulnerability exploitation (T1068).
NVD Description
An Insecure Direct Object Reference (IDOR) in Pagekit CMS v1.0.18 allows attackers to escalate privileges.
Deeper analysisAI
CVE-2025-67165 is an Insecure Direct Object Reference (IDOR) vulnerability, mapped to CWE-639, affecting Pagekit CMS version 1.0.18. Published on 2025-12-17, it enables attackers to escalate privileges through improper handling of direct object references within the CMS.
The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), making it exploitable by unauthenticated attackers over the network with low complexity and no user interaction required. Successful exploitation allows privilege escalation, granting high-impact access to confidential data (C:H), integrity modifications (I:H), and availability disruptions (A:H) without changing the scope.
Mitigation details and further analysis are available in the referenced advisories, including the vulnerability research repository at https://github.com/mbiesiad/vulnerability-research/tree/main/CVE-2025-67165, Pagekit documentation on user permissions (https://github.com/pagekit/docs/blob/develop/user-interface/users.md#permissions) and roles (https://github.com/pagekit/docs/blob/develop/user-interface/users.md#roles), and the official Pagekit repository (https://github.com/pagekit/pagekit).
Details
- CWE(s)