INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global malware Financial Services, Cryptocurrency CRITICAL 51m Global general Financial Services and E-commerce MEDIUM 54m Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 1h Global phishing Technology and Consumer Services HIGH 1h Global data_breach Multiple sectors HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global apt Financial Services, Government HIGH 2h Global insider Cross-sector CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 51m Global general Financial Services and E-commerce MEDIUM 54m Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 1h Global phishing Technology and Consumer Services HIGH 1h Global data_breach Multiple sectors HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global apt Financial Services, Government HIGH 2h Global insider Cross-sector CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 51m Global general Financial Services and E-commerce MEDIUM 54m Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 1h Global phishing Technology and Consumer Services HIGH 1h Global data_breach Multiple sectors HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global apt Financial Services, Government HIGH 2h Global insider Cross-sector CRITICAL 3h
Vulnerabilities

CVE-2025-15456

High ⚡ Exploit Available
MiniCMS Authentication Bypass Vulnerability in Page Editor (CVE-2025-15456)
CWE-287 — Weakness Type
Published: Jan 5, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
7.3
🔗 NVD Official
📄 Description (English)

A vulnerability has been found in bg5sbk MiniCMS up to 1.8. The affected element is an unknown function of the file /mc-admin/page-edit.php of the component Publish Page Handler. Such manipulation leads to improper authentication. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The existence of this vulnerability is still disputed at present. The vendor was contacted early about this disclosure but did not respond in any way.

🤖 AI Executive Summary

A critical authentication bypass vulnerability (CWE-287) has been identified in bg5sbk MiniCMS versions up to 1.8, specifically in the /mc-admin/page-edit.php file of the Publish Page Handler component. The vulnerability allows remote attackers to bypass authentication mechanisms, with a CVSS score of 7.3 (High). Public exploits are available, and the vendor has not responded to disclosure attempts.

📄 Description (Arabic)

تؤثر هذه الثغرة الأمنية على نظام إدارة المحتوى MiniCMS في الإصدارات حتى 1.8، حيث توجد نقطة ضعف في آلية المصادقة ضمن معالج تحرير ونشر الصفحات الإدارية. يمكن للمهاجمين استغلال هذه الثغرة عن بُعد للوصول غير المصرح به إلى وظائف إدارية حساسة دون الحاجة لبيانات اعتماد صحيحة. تكمن خطورة الثغرة في توفر استغلالات عامة وعدم استجابة المورّد لإصدار تصحيحات أمنية، مما يترك الأنظمة المتأثرة عرضة للاختراق. تتطلب الثغرة اهتماماً فورياً من المؤسسات التي تستخدم هذا النظام لحماية بياناتها وأصولها الرقمية.

🤖 ملخص تنفيذي (AI)

تم اكتشاف ثغرة حرجة في تجاوز المصادقة (CWE-287) في نظام bg5sbk MiniCMS حتى الإصدار 1.8، تحديداً في ملف /mc-admin/page-edit.php ضمن مكون معالج نشر الصفحات. تسمح الثغرة للمهاجمين عن بُعد بتجاوز آليات المصادقة، بدرجة خطورة CVSS 7.3 (عالية). تتوفر استغلالات عامة للثغرة، ولم يستجب المورّد لمحاولات الإفصاح.

🤖 AI Intelligence Analysis Analyzed: Feb 28, 2026 07:23
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations using MiniCMS for content management face significant risk of unauthorized administrative access and potential data breaches. Given the availability of public exploits and lack of vendor patches, affected systems are highly vulnerable to immediate exploitation, particularly impacting government portals, educational institutions, and SMEs using this CMS platform.
🏢 Affected Saudi Sectors
القطاع الحكومي التعليم العالي والجامعات الشركات الصغيرة والمتوسطة المؤسسات الإعلامية والنشر الرقمي القطاع الخاص - خدمات الويب المنظمات غير الربحية
🎯 MITRE ATT&CK Techniques
⚖️ Saudi Risk Score (AI)
8.0
/ 10.0
🔧 Remediation Steps (English)
1. Immediately isolate or disable all MiniCMS installations (versions ≤1.8) from public internet access and implement network segmentation with strict firewall rules allowing only authorized IP addresses to access administrative interfaces
2. Deploy Web Application Firewall (WAF) rules to block suspicious requests targeting /mc-admin/page-edit.php and implement multi-factor authentication (MFA) at the network perimeter level for all administrative access attempts
3. Migrate to actively maintained and secure CMS alternatives (WordPress, Joomla, Drupal) with proper security support, or implement custom authentication wrapper with strong session management and input validation until migration is complete
🔧 خطوات المعالجة (العربية)
1. عزل أو تعطيل جميع تثبيتات MiniCMS (الإصدارات ≤1.8) فوراً عن الوصول العام للإنترنت وتطبيق تجزئة الشبكة مع قواعد جدار حماية صارمة تسمح فقط لعناوين IP المصرح بها بالوصول إلى الواجهات الإدارية
2. نشر قواعد جدار حماية تطبيقات الويب (WAF) لحظر الطلبات المشبوهة المستهدفة لملف /mc-admin/page-edit.php وتطبيق المصادقة متعددة العوامل (MFA) على مستوى محيط الشبكة لجميع محاولات الوصول الإداري
3. الانتقال إلى بدائل أنظمة إدارة محتوى مدعومة وآمنة (WordPress أو Joomla أو Drupal) مع دعم أمني مناسب، أو تطبيق غلاف مصادقة مخصص مع إدارة جلسات قوية والتحقق من المدخلات حتى اكتمال الترحيل
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-2 (Access Control) ECC-1-3 (Authentication Management) ECC-2-1 (Vulnerability Management) ECC-3-1 (Security Monitoring) ECC-5-1 (Patch Management)
🔵 SAMA CSF
CCC-1.1 (Asset Management) CCC-2.1 (Access Control) CCC-2.2 (Authentication Mechanisms) CCC-4.1 (Vulnerability Assessment) CCC-6.1 (Security Monitoring)
🟡 ISO 27001:2022
A.9.1.1 (Access Control Policy) A.9.2.1 (User Registration) A.9.4.1 (Information Access Restriction) A.12.6.1 (Technical Vulnerability Management) A.18.2.3 (Technical Compliance Review)
📦 Affected Products / CPE 1 entries
1234n:minicms
📊 CVSS Score
7.3
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredN — None / Network
User InteractionN — None / Network
ScopeU — Unchanged
ConfidentialityL — Low / Local
IntegrityL — Low / Local
AvailabilityL — Low / Local
📋 Quick Facts
Severity High
CVSS Score7.3
CWECWE-287
EPSS0.24%
Exploit ✓ Yes
Patch ✓ Yes
Published 2026-01-05
Source Feed nvd
Views 1
🇸🇦 Saudi Risk Score
8.0
/ 10.0 — Saudi Risk
Priority: HIGH
🏷️ Tags
exploit-available CWE-287
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.