UliCMS 2023.1 contains an authentication bypass vulnerability that allows unauthenticated attackers to create admin users through mass assignment in the UserController. Attackers can send a crafted POST request to the admin index.php endpoint with specific parameters to generate an administrative account with full system access.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 17 Dec 2025 23:00:00 +0000

Type Values Removed Values Added
Description UliCMS 2023.1 contains an authentication bypass vulnerability that allows unauthenticated attackers to create admin users through mass assignment in the UserController. Attackers can send a crafted POST request to the admin index.php endpoint with specific parameters to generate an administrative account with full system access.
Title UliCMS 2023.1 Authentication Bypass via Mass Assignment Vulnerability
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-17T22:44:49.556Z

Reserved: 2025-12-16T19:22:09.995Z

Link: CVE-2023-53914

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-17T23:15:49.983

Modified: 2025-12-17T23:15:49.983

Link: CVE-2023-53914

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses