Cyber Posture

CVE-2025-65271

High

Published: 08 December 2025

Published
08 December 2025
Modified
12 December 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0010 27.6th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may create or modify references in user document templates to conceal malicious code or force authentication attempts.

Security Summary

CVE-2025-65271 is a client-side template injection (CSTI) vulnerability in the admin dashboard of Azuriom CMS, a content management system. It affects versions prior to 1.2.7 and is classified under CWE-94 (Improper Control of Generation of Code ('Code Injection')). The issue arises when plugins or dashboard components render untrusted user input without proper sanitization, enabling the injection and execution of arbitrary template code. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its network accessibility, low attack complexity, and potential for high impact on confidentiality, integrity, and availability.

A low-privilege user can exploit this vulnerability by submitting malicious input through affected plugins or dashboard components. When an administrator views or interacts with this untrusted input in their session, the injected template code executes in the context of the administrator's browser or session. This allows the attacker to achieve privilege escalation, potentially gaining full administrative control over the CMS instance.

Azuriom addressed the vulnerability in version 1.2.7, with the specific fix implemented in commit 0289175547319add814dcb526e8ba034f1ebc3ec available on the project's GitHub repository (https://github.com/Azuriom/Azuriom). Security practitioners should advise upgrading to Azuriom 1.2.7 or later and reviewing custom plugins for similar input rendering issues. Additional details are documented in the CVE advisory repository at https://github.com/1337Skid/CVE-2025-65271.

Details

CWE(s)
CWE-94

Affected Products

azuriom
azuriom
≤ 1.2.7

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1221 Template Injection Stealth
Adversaries may create or modify references in user document templates to conceal malicious code or force authentication attempts.
Why these techniques?

The client-side template injection (CSTI) vulnerability enables exploitation of a client-side rendering flaw (T1203, T1221) in the admin dashboard, allowing arbitrary code execution in an administrator's session context, facilitating privilege escalation (T1068).

References