PAD CMS is vulnerable to Cross-Site Request Forgery in reset password's functionality. Malicious attacker can craft special website, which when visited by the victim, will automatically send a POST request changing currently logged user's password to defined by the attacker value. This issue affects all 3 templates: www, bip and www+bip.

This product is End-Of-Life and producent will not publish patches for this vulnerability.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 30 Sep 2025 10:15:00 +0000

Type Values Removed Values Added
Description PAD CMS is vulnerable to Cross-Site Request Forgery in reset password's functionality. Malicious attacker can craft special website, which when visited by the victim, will automatically send a POST request changing currently logged user's password to defined by the attacker value. This issue affects all 3 templates: www, bip and www+bip. This product is End-Of-Life and producent will not publish patches for this vulnerability.
Title Cross-Site Request Forgery in PAD CMS
Weaknesses CWE-352
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published:

Updated: 2025-09-30T10:04:54.900Z

Reserved: 2025-07-24T14:23:32.250Z

Link: CVE-2025-8119

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-30T11:37:44.167

Modified: 2025-09-30T11:37:44.167

Link: CVE-2025-8119

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.