CVE-2023-53923
Published: 17 December 2025
Description
UliCMS 2023.1 contains a privilege escalation vulnerability that allows unauthenticated attackers to create administrative accounts through the UserController endpoint. Attackers can send a crafted POST request to /dist/admin/index.php with specific parameters to generate a new admin user with full system…
more
access.
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for access to system resources, directly addressing the missing authorization in UserController that permits unauthenticated admin account creation.
Manages system accounts including provisioning new accounts with proper authorization, preventing unauthenticated attackers from creating administrative accounts.
Protects public access interfaces by requiring identification and authentication, mitigating exploitation of the publicly accessible /dist/admin/index.php endpoint.
Security SummaryAI
CVE-2023-53923 is a privilege escalation vulnerability in UliCMS version 2023.1, stemming from CWE-862 (Missing Authorization). The flaw resides in the UserController endpoint, where unauthenticated attackers can send a crafted POST request to /dist/admin/index.php with specific parameters to create a new administrative account, granting full system access.
Unauthenticated remote attackers can exploit this vulnerability over the network with low attack complexity, no required privileges, and no user interaction, as indicated by its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Successful exploitation enables attackers to generate admin users, achieving high impacts on confidentiality, integrity, and availability through complete administrative control.
Advisories such as the VulnCheck report and Exploit-DB entry (ID 51433) document the issue, including a public proof-of-concept exploit demonstrating the unauthenticated admin account creation. No patch or mitigation details are specified in the CVE description.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability enables unauthenticated exploitation of a public-facing web application (T1190) via crafted POST request lacking authorization, directly creating a new administrative account (T1136.001) and achieving privilege escalation to full system access (T1068).