Cyber Posture

CVE-2025-25379

Critical

Published: 28 February 2025

Published
28 February 2025
Modified
15 April 2025
KEV Added
Patch
CVSS Score 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
EPSS Score 0.0085 75.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

An adversary may rely upon a user clicking a malicious link in order to gain execution.

Security Summary

CVE-2025-25379 is a Cross-Site Request Forgery (CSRF) vulnerability, mapped to CWE-352, affecting 07FLYCMS version 1.3.9. The flaw resides in the del.html component, where a remote attacker can exploit the id parameter to execute arbitrary code. Published on 2025-02-28, it carries a CVSS v3.1 base score of 9.6 (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H), indicating critical severity due to its potential for high-impact compromise.

The vulnerability can be exploited by a remote attacker requiring no privileges over the network with low attack complexity, though it necessitates user interaction, such as tricking an authenticated user into visiting a malicious site or clicking a forged link. Upon success, the attack changes scope and grants high confidentiality, integrity, and availability impacts, culminating in arbitrary code execution on the targeted 07FLYCMS instance.

Advisories and further details, including potential patches or workarounds, are referenced in the GitHub repository at https://github.com/R2og/Sun-jialiang/tree/main/9/readme.md.

Details

CWE(s)
CWE-352

Affected Products

07fly
07flycms
1.3.9

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1204.001 Malicious Link Execution
An adversary may rely upon a user clicking a malicious link in order to gain execution.
Why these techniques?

CSRF vuln in public-facing CMS allows RCE via forged link requiring user interaction, directly mapping to T1190 (exploit public-facing app) and T1204.001 (malicious link for user execution).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References