CVE-2025-12868
Published: 10 November 2025
Description
New Site Server developed by CyberTutor has a Use of Client-Side Authentication vulnerability, allowing unauthenticated remote attackers to modify the frontend code to gain administrator privileges on the website.
Mitigating Controls (NIST 800-53 r5)AI
Enforces server-side access control policies, directly preventing attackers from gaining administrator privileges by modifying client-side authentication logic.
Requires server-side identification and authentication for non-organizational users, mitigating exploitation by unauthenticated remote attackers tampering with frontend code.
Implements protections for publicly accessible system components, countering risks from network-accessible frontend vulnerabilities exploited without authentication.
Security SummaryAI
CVE-2025-12868, published on 2025-11-10, is a Use of Client-Side Authentication vulnerability (CWE-603) affecting New Site Server, a product developed by CyberTutor. The flaw enables unauthenticated remote attackers to modify frontend code, allowing them to gain administrator privileges on the website. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting critical severity due to its network-based exploitability with low complexity and high impacts across confidentiality, integrity, and availability.
Unauthenticated remote attackers with network access to a vulnerable New Site Server instance can exploit this issue without requiring privileges or user interaction. By altering the client-side authentication logic in the frontend code, they achieve administrator-level access, enabling full control over the website, such as data manipulation, unauthorized access to sensitive information, or further persistence.
Advisories from TWCERT/CC provide details on this vulnerability, accessible at https://www.twcert.org.tw/en/cp-139-10492-84a10-2.html and https://www.twcert.org.tw/tw/cp-132-10493-bf807-1.html. Security practitioners should review these references for recommended mitigations, including any available patches or configuration changes.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability allows unauthenticated remote attackers to modify frontend code of a public-facing web application to gain administrator privileges, directly mapping to exploitation of public-facing applications.