The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-63523

CVE-2025-63523: Feehi FeehiCMS Auth Bypass Vulnerability

CVE-2025-63523 is an authentication bypass flaw in Feehi FeehiCMS that allows attackers to modify read-only parameters and change usernames. This post explains its technical details, affected versions, and mitigation.

Updated: January 22, 2026

CVE-2025-63523 Overview

CVE-2025-63523 is a server-side parameter validation bypass vulnerability in FeehiCMS version 2.1.1. The application fails to enforce server-side immutability for parameters that are presented to clients as "read-only." An authenticated attacker can intercept and modify these parameters in transit, and the backend accepts the changes without proper validation. This vulnerability can lead to unintended username changes and potentially other unauthorized data modifications.

Critical Impact

Authenticated attackers can bypass client-side restrictions to modify read-only parameters, enabling unauthorized username changes and potential account manipulation in FeehiCMS installations.

Affected Products

  • FeehiCMS version 2.1.1
  • Feehi Feehicms (CPE: cpe:2.3:a:feehi:feehicms:2.1.1:*:*:*:*:*:*:*)

Discovery Timeline

  • 2025-12-01 - CVE-2025-63523 published to NVD
  • 2025-12-02 - Last updated in NVD database

Technical Details for CVE-2025-63523

Vulnerability Analysis

This vulnerability represents a classic case of client-side trust without server-side validation. FeehiCMS version 2.1.1 presents certain parameters as read-only in the user interface, giving users the impression that these values cannot be modified. However, the application relies solely on client-side controls to enforce this restriction.

The vulnerability has been assigned a CVSS v3.1 score of 6.5 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N. This indicates:

  • Attack Vector: Network-based exploitation
  • Attack Complexity: Low - no special conditions required
  • Privileges Required: None (though authenticated access to the CMS is needed)
  • User Interaction: None required
  • Impact: Low confidentiality and integrity impact with no availability impact

The EPSS (Exploit Prediction Scoring System) probability is 0.034% (9.335 percentile), indicating a relatively low likelihood of exploitation in the wild.

Root Cause

The root cause of this vulnerability is improper input validation on the server side. The application architecture assumes that client-side "read-only" field designations will prevent modification of sensitive parameters. This violates a fundamental security principle: never trust client-side input.

When a user submits form data containing parameters marked as read-only on the frontend, the backend does not verify whether those parameters should be immutable. Instead, it accepts and processes all submitted values, including those that should be protected from modification.

The CWE classification (CWE-125) suggests issues related to input boundary conditions, though the primary vulnerability type is Broken Access Control and Improper Input Validation.

Attack Vector

The attack leverages the network-accessible nature of the FeehiCMS application. An authenticated attacker can exploit this vulnerability through the following mechanism:

  1. The attacker authenticates to the FeehiCMS application with valid credentials
  2. The attacker navigates to a page containing read-only parameters (such as the username field)
  3. Using a proxy tool (such as Burp Suite) or browser developer tools, the attacker intercepts the HTTP request
  4. The attacker modifies the read-only parameter value in the intercepted request
  5. The modified request is forwarded to the server
  6. The server accepts the modified parameter without validation, applying the unauthorized change

The vulnerability mechanism relies on intercepting HTTP traffic between the client and server. When the application renders form fields as read-only using HTML attributes or JavaScript, this only prevents modification in the browser interface. An attacker with knowledge of the underlying HTTP request structure can bypass these client-side controls entirely by manipulating the raw request data before it reaches the server.

For detailed technical information and proof-of-concept details, refer to the vendor advisory on GitHub and the CVE documentation.

Detection Methods for CVE-2025-63523

Indicators of Compromise

  • Unexpected username changes in user accounts without corresponding legitimate user activity
  • HTTP POST requests containing modified values for parameters that should be read-only
  • Audit log entries showing parameter changes that bypass normal user interface workflows
  • Multiple rapid parameter modification requests from the same session

Detection Strategies

Organizations running FeehiCMS 2.1.1 should implement the following detection strategies:

Web Application Firewall (WAF) Rules: Configure WAF rules to detect and alert on HTTP requests that contain unexpected modifications to parameters that should be immutable. This requires knowledge of which parameters should be protected.

Server-Side Logging: Enable comprehensive logging of all parameter changes, particularly for sensitive fields like usernames. Compare submitted values against expected read-only values to identify manipulation attempts.

Behavioral Analysis: Monitor for patterns of parameter modification that deviate from normal user behavior, such as changes to fields that users typically do not modify through the standard interface.

SentinelOne Singularity Platform: Organizations using SentinelOne can leverage behavioral AI detection to identify anomalous web application activity. The platform's ability to correlate network traffic with application behavior can help identify exploitation attempts.

Monitoring Recommendations

  • Implement audit logging for all user profile and account modifications
  • Monitor HTTP traffic for requests containing parameters that should be server-controlled
  • Set up alerts for username changes that occur outside of expected administrative workflows
  • Regularly review access logs for signs of proxy-based request manipulation
  • Consider implementing Content Security Policy headers and request integrity checks

How to Mitigate CVE-2025-63523

Immediate Actions Required

  • Update FeehiCMS to a patched version when available from the vendor
  • Implement server-side validation for all parameters, regardless of client-side restrictions
  • Add authorization checks to verify that users are permitted to modify specific parameters
  • Enable comprehensive audit logging for all parameter modifications
  • Consider implementing request signing or integrity verification mechanisms

Patch Information

As of the last NVD update on 2025-12-02, organizations should monitor the official FeehiCMS GitHub repository for security patches addressing this vulnerability. The vendor advisory provides ongoing updates regarding the remediation status.

Until an official patch is available, organizations should implement the workarounds described below and consider the risk exposure of their FeehiCMS deployment.

Workarounds

If immediate patching is not possible, implement the following workarounds to reduce risk:

Server-Side Validation: Modify the application code to explicitly validate that read-only parameters cannot be modified by comparing submitted values against stored values before processing updates. For the username field specifically, ensure the server rejects any modification attempts through standard form submissions.

Web Application Firewall: Deploy or configure a WAF to filter requests containing modifications to known read-only parameters. Block or alert on requests that attempt to change protected fields.

Access Control Enhancement: Implement additional authorization checks at the controller or model level to verify that the current user has permission to modify specific parameters.

Network Segmentation: Limit network access to the FeehiCMS administrative interface to trusted networks only, reducing the attack surface for authenticated attacks.

Session Hardening: Implement strict session management controls including shorter session timeouts and IP binding to limit the window of opportunity for authenticated attackers.

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechFeehi

  • SeverityMEDIUM

  • CVSS Score6.5

  • EPSS Probability0.03%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-125
  • Technical References
  • Exploit, Third Party Advisory
  • Vendor Resources
  • Exploit, Issue Tracking, Vendor Advisory
  • Related CVEs
  • CVE-2025-63520: Feehi FeehiCMS XSS Vulnerability

  • CVE-2025-63522: Feehi FeehiCMS Reverse Tabnabbing Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English