All the vulnerabilites related to Polska Akademia Dostępności - PAD CMS
cve-2025-8121
Vulnerability from cvelistv5
Published
2025-09-30 10:05
Modified
2025-09-30 19:15
Severity ?
EPSS score ?
Summary
Blind SQL Injection in PAD CMS
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Polska Akademia Dostępności | PAD CMS |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-8121", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-09-30T19:15:45.471635Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-30T19:15:53.681Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "PAD CMS", "vendor": "Polska Akademia Dost\u0119pno\u015bci", "versions": [ { "lessThanOrEqual": "1.2.1", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Miko\u0142aj Matuszewski (CERT.PL)" } ], "datePublic": "2025-09-30T09:55:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper neutralization of input provided by an authorized user in article positioning functionality allows for Blind SQL Injection attacks. This issue affects all 3 templates: www, bip and ww+bip.\u003cbr\u003e\u003cbr\u003eThis product is End-Of-Life and producent will not publish patches for this vulnerability.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Improper neutralization of input provided by an authorized user in article positioning functionality allows for Blind SQL Injection attacks. This issue affects all 3 templates: www, bip and ww+bip.\n\nThis product is End-Of-Life and producent will not publish patches for this vulnerability." } ], "impacts": [ { "capecId": "CAPEC-7", "descriptions": [ { "lang": "en", "value": "CAPEC-7 Blind SQL Injection" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.7, "baseSeverity": "HIGH", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-30T10:05:13.295Z", "orgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", "shortName": "CERT-PL" }, "references": [ { "url": "https://cert.pl/posts/2025/09/CVE-2025-7063" } ], "source": { "discovery": "INTERNAL" }, "tags": [ "unsupported-when-assigned" ], "title": "Blind SQL Injection in PAD CMS", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", "assignerShortName": "CERT-PL", "cveId": "CVE-2025-8121", "datePublished": "2025-09-30T10:05:13.295Z", "dateReserved": "2025-07-24T14:25:52.184Z", "dateUpdated": "2025-09-30T19:15:53.681Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-7063
Vulnerability from cvelistv5
Published
2025-09-30 10:03
Modified
2025-09-30 19:11
Severity ?
EPSS score ?
Summary
Remote Code Execution via Unrestricted File Upload in PAD CMS
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Polska Akademia Dostępności | PAD CMS |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-7063", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-30T19:11:22.475569Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-30T19:11:49.226Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "PAD CMS", "vendor": "Polska Akademia Dost\u0119pno\u015bci", "versions": [ { "lessThanOrEqual": "1.2.1", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Kamil Szczurowski" }, { "lang": "en", "type": "finder", "value": "Robert Kruczek" } ], "datePublic": "2025-09-30T09:55:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Due to client-controlled permission check parameter, PAD CMS\u0027s file upload functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can then be executed leading to Remote Code Execution. This issue affects all 3 templates: www, bip and ww+bip.\u003cbr\u003e\u003cbr\u003eThis product is End-Of-Life and producent will not publish patches for this vulnerability." } ], "value": "Due to client-controlled permission check parameter, PAD CMS\u0027s file upload functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can then be executed leading to Remote Code Execution. This issue affects all 3 templates: www, bip and ww+bip.\n\nThis product is End-Of-Life and producent will not publish patches for this vulnerability." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 10, "baseSeverity": "CRITICAL", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-30T10:03:59.027Z", "orgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", "shortName": "CERT-PL" }, "references": [ { "url": "https://cert.pl/posts/2025/09/CVE-2025-7063" } ], "source": { "discovery": "EXTERNAL" }, "tags": [ "unsupported-when-assigned" ], "title": "Remote Code Execution via Unrestricted File Upload in PAD CMS", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", "assignerShortName": "CERT-PL", "cveId": "CVE-2025-7063", "datePublished": "2025-09-30T10:03:59.027Z", "dateReserved": "2025-07-04T08:50:22.941Z", "dateUpdated": "2025-09-30T19:11:49.226Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-7065
Vulnerability from cvelistv5
Published
2025-09-30 10:04
Modified
2025-09-30 19:12
Severity ?
EPSS score ?
Summary
Remote Code Execution via Unrestricted File Upload in PAD CMS
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Polska Akademia Dostępności | PAD CMS |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-7065", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-30T19:12:03.864126Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-30T19:12:23.081Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "PAD CMS", "vendor": "Polska Akademia Dost\u0119pno\u015bci", "versions": [ { "lessThanOrEqual": "1.2.1", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Kamil Szczurowski" }, { "lang": "en", "type": "finder", "value": "Robert Kruczek" } ], "datePublic": "2025-09-30T09:55:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Due to client-controlled permission check parameter, PAD CMS\u0027s photo upload functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can then be executed leading to Remote Code Execution. This issue affects all 3 templates: www, bip and ww+bip.\u003cbr\u003e\u003cbr\u003eThis product is End-Of-Life and producent will not publish patches for this vulnerability." } ], "value": "Due to client-controlled permission check parameter, PAD CMS\u0027s photo upload functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can then be executed leading to Remote Code Execution. This issue affects all 3 templates: www, bip and ww+bip.\n\nThis product is End-Of-Life and producent will not publish patches for this vulnerability." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 10, "baseSeverity": "CRITICAL", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-30T10:04:07.400Z", "orgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", "shortName": "CERT-PL" }, "references": [ { "url": "https://cert.pl/posts/2025/09/CVE-2025-7063" } ], "source": { "discovery": "EXTERNAL" }, "tags": [ "unsupported-when-assigned" ], "title": "Remote Code Execution via Unrestricted File Upload in PAD CMS", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", "assignerShortName": "CERT-PL", "cveId": "CVE-2025-7065", "datePublished": "2025-09-30T10:04:07.400Z", "dateReserved": "2025-07-04T10:02:18.103Z", "dateUpdated": "2025-09-30T19:12:23.081Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-8116
Vulnerability from cvelistv5
Published
2025-09-30 10:04
Modified
2025-09-30 19:13
Severity ?
EPSS score ?
Summary
Reflected XSS in PAD CMS
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Polska Akademia Dostępności | PAD CMS |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-8116", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-30T19:12:54.368504Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-30T19:13:04.145Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "PAD CMS", "vendor": "Polska Akademia Dost\u0119pno\u015bci", "versions": [ { "lessThanOrEqual": "1.2.1", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Jakub Szweda (CERT.PL)" } ], "datePublic": "2025-09-30T09:55:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "PAD CMS is vulnerable to Reflected XSS in printing and save to PDF functionality. Malicious attacker can craft special URL, which will result in arbitrary JavaScript execution in victim\u0027s browser, when opened. This issue affects all 3 templates: www, bip and www+bip.\u003cbr\u003e\u003cbr\u003eThis product is End-Of-Life and producent will not publish patches for this vulnerability. \u003cbr\u003e" } ], "value": "PAD CMS is vulnerable to Reflected XSS in printing and save to PDF functionality. Malicious attacker can craft special URL, which will result in arbitrary JavaScript execution in victim\u0027s browser, when opened. This issue affects all 3 templates: www, bip and www+bip.\n\nThis product is End-Of-Life and producent will not publish patches for this vulnerability." } ], "impacts": [ { "capecId": "CAPEC-591", "descriptions": [ { "lang": "en", "value": "CAPEC-591 Reflected XSS" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.1, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "LOW", "userInteraction": "ACTIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-30T10:04:25.946Z", "orgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", "shortName": "CERT-PL" }, "references": [ { "url": "https://cert.pl/posts/2025/09/CVE-2025-7063" } ], "source": { "discovery": "INTERNAL" }, "tags": [ "unsupported-when-assigned" ], "title": "Reflected XSS in PAD CMS", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", "assignerShortName": "CERT-PL", "cveId": "CVE-2025-8116", "datePublished": "2025-09-30T10:04:25.946Z", "dateReserved": "2025-07-24T13:38:01.739Z", "dateUpdated": "2025-09-30T19:13:04.145Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-8118
Vulnerability from cvelistv5
Published
2025-09-30 10:04
Modified
2025-09-30 19:14
Severity ?
EPSS score ?
Summary
Bruteforce Protection Bypass in PAD CMS
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Polska Akademia Dostępności | PAD CMS |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-8118", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-30T19:14:12.135071Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-30T19:14:22.705Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "PAD CMS", "vendor": "Polska Akademia Dost\u0119pno\u015bci", "versions": [ { "lessThanOrEqual": "1.2.1", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Mateusz Jurczak (CERT.PL)" } ], "datePublic": "2025-09-30T09:55:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "PAD CMS implements weak client-side brute-force protection by utilizing two cookies:\u0026nbsp;\u0026nbsp;\u003ctt\u003elogin_count\u003c/tt\u003e\u0026nbsp;and \u003ctt\u003elogin_timeout.\u003c/tt\u003e\u0026nbsp;Information about attempt count or timeout is not stored on the server, which allows a malicious attacker to bypass this brute-force protection by resetting those cookies. This issue affects all 3 templates: www, bip and www+bip.\u003cbr\u003e\u003cbr\u003eThis product is End-Of-Life and producent will not publish patches for this vulnerability.\u003cbr\u003e\u003cbr\u003e" } ], "value": "PAD CMS implements weak client-side brute-force protection by utilizing two cookies:\u00a0\u00a0login_count\u00a0and login_timeout.\u00a0Information about attempt count or timeout is not stored on the server, which allows a malicious attacker to bypass this brute-force protection by resetting those cookies. This issue affects all 3 templates: www, bip and www+bip.\n\nThis product is End-Of-Life and producent will not publish patches for this vulnerability." } ], "impacts": [ { "capecId": "CAPEC-49", "descriptions": [ { "lang": "en", "value": "CAPEC-49 Password Brute Forcing" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 6.9, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-307", "description": "CWE-307 Improper Restriction of Excessive Authentication Attempts", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-30T10:04:46.284Z", "orgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", "shortName": "CERT-PL" }, "references": [ { "url": "https://cert.pl/posts/2025/09/CVE-2025-7063" } ], "source": { "discovery": "INTERNAL" }, "tags": [ "unsupported-when-assigned" ], "title": "Bruteforce Protection Bypass in PAD CMS", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", "assignerShortName": "CERT-PL", "cveId": "CVE-2025-8118", "datePublished": "2025-09-30T10:04:46.284Z", "dateReserved": "2025-07-24T14:23:20.335Z", "dateUpdated": "2025-09-30T19:14:22.705Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-8117
Vulnerability from cvelistv5
Published
2025-09-30 10:04
Modified
2025-09-30 19:13
Severity ?
EPSS score ?
Summary
Account Takeover via Reset Password Functionality in PAD CMS
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Polska Akademia Dostępności | PAD CMS |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-8117", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-30T19:13:40.229511Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-30T19:13:51.495Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "PAD CMS", "vendor": "Polska Akademia Dost\u0119pno\u015bci", "versions": [ { "lessThanOrEqual": "1.2.1", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Mateusz Jurczak (CERT.PL)" } ], "datePublic": "2025-09-30T09:55:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "PAD CMS improperly initializes parameter used for password recovery, which allows to change password for any user that did not use reset password functionality. This issue affects all 3 templates: www, bip and www+bip.\u003cbr\u003e\u003cbr\u003eThis product is End-Of-Life and producent will not publish patches for this vulnerability.\u003cbr\u003e" } ], "value": "PAD CMS improperly initializes parameter used for password recovery, which allows to change password for any user that did not use reset password functionality. This issue affects all 3 templates: www, bip and www+bip.\n\nThis product is End-Of-Life and producent will not publish patches for this vulnerability." } ], "impacts": [ { "capecId": "CAPEC-50", "descriptions": [ { "lang": "en", "value": "CAPEC-50 Password Recovery Exploitation" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.7, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-909", "description": "CWE-909 Missing Initialization of Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-30T10:04:38.373Z", "orgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", "shortName": "CERT-PL" }, "references": [ { "url": "https://cert.pl/posts/2025/09/CVE-2025-7063" } ], "source": { "discovery": "INTERNAL" }, "tags": [ "unsupported-when-assigned" ], "title": "Account Takeover via Reset Password Functionality in PAD CMS", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", "assignerShortName": "CERT-PL", "cveId": "CVE-2025-8117", "datePublished": "2025-09-30T10:04:38.373Z", "dateReserved": "2025-07-24T14:23:19.019Z", "dateUpdated": "2025-09-30T19:13:51.495Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-8119
Vulnerability from cvelistv5
Published
2025-09-30 10:04
Modified
2025-09-30 19:14
Severity ?
EPSS score ?
Summary
Cross-Site Request Forgery in PAD CMS
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Polska Akademia Dostępności | PAD CMS |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-8119", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-30T19:14:39.077542Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-30T19:14:50.548Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "PAD CMS", "vendor": "Polska Akademia Dost\u0119pno\u015bci", "versions": [ { "lessThanOrEqual": "1.2.1", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "CERT.PL" } ], "datePublic": "2025-09-30T09:55:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "PAD CMS is vulnerable to Cross-Site Request Forgery in reset password\u0027s functionality. Malicious attacker can craft special website, which when visited by the victim, will automatically send a POST request changing currently logged user\u0027s password to defined by the attacker value.\u0026nbsp;This issue affects all 3 templates: www, bip and www+bip.\u003cbr\u003e\u003cbr\u003eThis product is End-Of-Life and producent will not publish patches for this vulnerability. \u003cbr\u003e\u003cbr\u003e" } ], "value": "PAD CMS is vulnerable to Cross-Site Request Forgery in reset password\u0027s functionality. Malicious attacker can craft special website, which when visited by the victim, will automatically send a POST request changing currently logged user\u0027s password to defined by the attacker value.\u00a0This issue affects all 3 templates: www, bip and www+bip.\n\nThis product is End-Of-Life and producent will not publish patches for this vulnerability." } ], "impacts": [ { "capecId": "CAPEC-62", "descriptions": [ { "lang": "en", "value": "CAPEC-62 Cross Site Request Forgery" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.1, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "ACTIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-30T10:04:54.900Z", "orgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", "shortName": "CERT-PL" }, "references": [ { "url": "https://cert.pl/posts/2025/09/CVE-2025-7063" } ], "source": { "discovery": "INTERNAL" }, "tags": [ "unsupported-when-assigned" ], "title": "Cross-Site Request Forgery in PAD CMS", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", "assignerShortName": "CERT-PL", "cveId": "CVE-2025-8119", "datePublished": "2025-09-30T10:04:54.900Z", "dateReserved": "2025-07-24T14:23:32.250Z", "dateUpdated": "2025-09-30T19:14:50.548Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-8120
Vulnerability from cvelistv5
Published
2025-09-30 10:05
Modified
2025-09-30 19:15
Severity ?
EPSS score ?
Summary
Remote Code Execution via Unrestricted File Upload in PAD CMS
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Polska Akademia Dostępności | PAD CMS |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-8120", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-30T19:15:20.428749Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-30T19:15:27.470Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "PAD CMS", "vendor": "Polska Akademia Dost\u0119pno\u015bci", "versions": [ { "lessThanOrEqual": "1.2.1", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "CERT.PL" } ], "datePublic": "2025-09-30T09:55:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Due to client-controlled permission check parameter, PAD CMS\u0027s upload photo functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can then be executed leading to Remote Code Execution.This issue affects all 3 templates: www, bip and ww+bip.\u003cbr\u003e\u003cbr\u003eThis product is End-Of-Life and producent will not publish patches for this vulnerability." } ], "value": "Due to client-controlled permission check parameter, PAD CMS\u0027s upload photo functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can then be executed leading to Remote Code Execution.This issue affects all 3 templates: www, bip and ww+bip.\n\nThis product is End-Of-Life and producent will not publish patches for this vulnerability." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 10, "baseSeverity": "CRITICAL", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-30T10:05:03.496Z", "orgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", "shortName": "CERT-PL" }, "references": [ { "url": "https://cert.pl/posts/2025/09/CVE-2025-7063" } ], "source": { "discovery": "INTERNAL" }, "tags": [ "unsupported-when-assigned" ], "title": "Remote Code Execution via Unrestricted File Upload in PAD CMS", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", "assignerShortName": "CERT-PL", "cveId": "CVE-2025-8120", "datePublished": "2025-09-30T10:05:03.496Z", "dateReserved": "2025-07-24T14:25:08.034Z", "dateUpdated": "2025-09-30T19:15:27.470Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-8122
Vulnerability from cvelistv5
Published
2025-09-30 10:05
Modified
2025-09-30 19:16
Severity ?
EPSS score ?
Summary
Blind SQL Injection in PAD CMS
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Polska Akademia Dostępności | PAD CMS |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-8122", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-09-30T19:16:27.251673Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-30T19:16:36.187Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "PAD CMS", "vendor": "Polska Akademia Dost\u0119pno\u015bci", "versions": [ { "lessThanOrEqual": "1.2.1", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Miko\u0142aj Matuszewski (CERT.PL)" } ], "datePublic": "2025-09-30T09:55:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper neutralization of input provided by an authorized user in article positioning functionality allows for Blind SQL Injection attacks.\u0026nbsp;This issue affects all 3 templates: www, bip and ww+bip.\u003cbr\u003e\u003cbr\u003eThis product is End-Of-Life and producent will not publish patches for this vulnerability.\u003cbr\u003e" } ], "value": "Improper neutralization of input provided by an authorized user in article positioning functionality allows for Blind SQL Injection attacks.\u00a0This issue affects all 3 templates: www, bip and ww+bip.\n\nThis product is End-Of-Life and producent will not publish patches for this vulnerability." } ], "impacts": [ { "capecId": "CAPEC-7", "descriptions": [ { "lang": "en", "value": "CAPEC-7 Blind SQL Injection" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.7, "baseSeverity": "HIGH", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-30T10:05:21.046Z", "orgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", "shortName": "CERT-PL" }, "references": [ { "url": "https://cert.pl/posts/2025/09/CVE-2025-7063" } ], "source": { "discovery": "INTERNAL" }, "tags": [ "unsupported-when-assigned" ], "title": "Blind SQL Injection in PAD CMS", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", "assignerShortName": "CERT-PL", "cveId": "CVE-2025-8122", "datePublished": "2025-09-30T10:05:21.046Z", "dateReserved": "2025-07-24T14:25:52.855Z", "dateUpdated": "2025-09-30T19:16:36.187Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }