Cyber Posture

CVE-2025-12868

Critical

Published: 10 November 2025

Published
10 November 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0028 51.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

New Site Server developed by CyberTutor has a Use of Client-Side Authentication vulnerability, allowing unauthenticated remote attackers to modify the frontend code to gain administrator privileges on the website.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces server-side access control policies, directly preventing attackers from gaining administrator privileges by modifying client-side authentication logic.

prevent

Requires server-side identification and authentication for non-organizational users, mitigating exploitation by unauthenticated remote attackers tampering with frontend code.

prevent

Implements protections for publicly accessible system components, countering risks from network-accessible frontend vulnerabilities exploited without authentication.

Security SummaryAI

CVE-2025-12868, published on 2025-11-10, is a Use of Client-Side Authentication vulnerability (CWE-603) affecting New Site Server, a product developed by CyberTutor. The flaw enables unauthenticated remote attackers to modify frontend code, allowing them to gain administrator privileges on the website. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting critical severity due to its network-based exploitability with low complexity and high impacts across confidentiality, integrity, and availability.

Unauthenticated remote attackers with network access to a vulnerable New Site Server instance can exploit this issue without requiring privileges or user interaction. By altering the client-side authentication logic in the frontend code, they achieve administrator-level access, enabling full control over the website, such as data manipulation, unauthorized access to sensitive information, or further persistence.

Advisories from TWCERT/CC provide details on this vulnerability, accessible at https://www.twcert.org.tw/en/cp-139-10492-84a10-2.html and https://www.twcert.org.tw/tw/cp-132-10493-bf807-1.html. Security practitioners should review these references for recommended mitigations, including any available patches or configuration changes.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability allows unauthenticated remote attackers to modify frontend code of a public-facing web application to gain administrator privileges, directly mapping to exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References