Codemers KLIMS, Privilege Escalation, CVE-2025-43947 (Critical)

Listen to this Post

How CVE-2025-43947 Works

CVE-2025-43947 exploits improper access control in Codemers KLIMS 1.6.DEV. The system fails to validate user roles before executing privileged actions. Attackers can send crafted HTTP requests (e.g., POST /admin/create_user) without admin privileges. The backend does not verify session tokens or role permissions, allowing unauthorized configuration changes, file uploads, and user creation. The vulnerability stems from missing `check_admin_access()` middleware in critical API endpoints.

DailyCVE Form

Platform: Codemers KLIMS
Version: 1.6.DEV
Vulnerability: Privilege Escalation
Severity: Critical
Date: 06/23/2025

Prediction: Patch by 08/2025

What Undercode Say

curl -X POST http://<target>/admin/create_user -d '{"user":"attacker","role":"admin"}'
import requests
requests.post("http://<target>/upload", files={"file": ("malicious.php", payload)}, cookies={"session": "stolen_token"})

How Exploit

1. Authenticate as low-privilege user.

2. Send forged requests to admin endpoints.

3. Bypass checks via direct API calls.

Protection from this CVE

  • Implement role-based access control (RBAC).
  • Validate session tokens rigorously.
  • Patch to KLIMS 1.6.1.

Impact

  • Full system compromise.
  • Unauthorized data manipulation.
  • Malware deployment.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top