EUVD-2025-17651

| CVE-2025-40658 HIGH
2025-06-10 [email protected]
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

3
EUVD ID Assigned
Mar 14, 2026 - 19:49 euvd
EUVD-2025-17651
Analysis Generated
Mar 14, 2026 - 19:49 vuln.today
CVE Published
Jun 10, 2025 - 10:15 nvd
HIGH 7.5

Description

An Insecure Direct Object Reference (IDOR) vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to access the private area setting the option parameter equal to 0, 1 or 2 in /administer/selectionnode/framesSelection.asp.

Analysis

CVE-2025-40658 is an Insecure Direct Object Reference (IDOR) vulnerability in DM Corporative CMS that allows unauthenticated remote attackers to bypass access controls and view private administrative areas by manipulating the 'option' parameter (values 0, 1, or 2) in the /administer/selectionnode/framesSelection.asp endpoint. The vulnerability has a CVSS 3.1 score of 7.5 (High) with high confidentiality impact, no privilege requirement, and no user interaction needed, making it a significant authentication bypass risk for affected CMS installations.

Technical Context

DM Corporative CMS is a web-based content management system that implements role-based access control through administrative interfaces. The vulnerability exists in the framesSelection.asp component, which is part of the administrative selection node framework. The root cause is CWE-639 (Authorization Bypass Through User-Controlled Key), where the application fails to properly validate that the requesting user has authorization to access administrative functions before processing parameter-based selection logic. The 'option' parameter acts as a direct object reference to administrative screens or data, and the application trusts client-supplied values without server-side authorization checks. This is a classic IDOR vulnerability where predictable parameter values (0, 1, 2) directly correspond to different administrative resources, and the lack of access control (PR:N in CVSS vector) means no authentication or session validation prevents unauthorized access.

Affected Products

DM Corporative CMS (version range not specified in advisory but likely all versions prior to patch release). The vulnerable endpoint is /administer/selectionnode/framesSelection.asp. Affected CPE would be: cpe:2.3:a:dm:corporative_cms:*:*:*:*:*:*:*:* (version information unavailable from provided data). Organizations running any version of DM Corporative CMS should be considered at risk unless a patched version has been deployed. Specific version information and vendor advisory details are not available in the provided intelligence; reference the official DM Corporative security advisory or vendor website for precise affected version ranges and patch availability.

Remediation

Immediate actions: (1) Apply vendor patch when available—contact DM Corporative for security updates or check vendor advisory portal for CVE-2025-40658 patch release; (2) If patches are unavailable, implement network-level access controls restricting /administer/ paths to authorized IP ranges or VPN; (3) Implement Web Application Firewall (WAF) rules to block requests to /administer/selectionnode/framesSelection.asp with option parameters, or require valid session tokens; (4) Audit access logs for exploitation patterns (requests to /administer/ without corresponding authentication events); (5) Enable HTTP parameter validation and re-implement authorization checks in framesSelection.asp to verify user roles before processing option parameter; (6) Conduct code review of all parameter-based access control in the /administer/ tree to identify similar IDOR issues. Long-term: migrate to updated CMS version with proper authorization framework once patches are validated.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +38
POC: 0

Share

EUVD-2025-17651 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy