29.0.00
CVE-2025-26211 describes a Cross-Site Request Forgery (CSRF) vulnerability affecting Gibbon CMS versions prior to 29.0.00. A CSRF attack allows an attacker to trick a user into performing actions they did not intend to, potentially leading to unauthorized modifications or deletions within the CMS. This vulnerability impacts users managing content and configurations within the Gibbon CMS. A fix is available in version 29.0.00.
The CSRF vulnerability in Gibbon CMS allows an attacker to craft malicious requests that appear to originate from a legitimate user. Successful exploitation could enable an attacker to modify content, delete data, or even gain administrative access to the CMS, depending on the user's permissions and the actions targeted. This could result in defacement of the website, data loss, or complete compromise of the CMS installation. The impact is amplified if the CMS is used to manage sensitive data or handle user authentication.
CVE-2025-26211 was published on 2025-05-27. There are currently no publicly known proof-of-concept exploits available. The vulnerability is assessed as LOW severity based on the CVSS score. It is not currently listed on the CISA KEV catalog. Active campaigns targeting this vulnerability are not currently known.
Websites and organizations using Gibbon CMS versions 0.0 through 29.0.00 are at risk. This includes small businesses, non-profit organizations, and any entity relying on Gibbon for content management. Shared hosting environments are particularly vulnerable, as attackers may be able to exploit the vulnerability on multiple websites hosted on the same server.
• php / web: Examine access logs for unusual requests originating from different domains or IP addresses. Look for POST requests to sensitive endpoints (e.g., user management, content editing) that don't originate from the expected user's session.
grep -i 'gibbon' /var/log/apache2/access.log | grep -i 'POST' | grep -i 'user=';• generic web: Use a web proxy or browser extension to monitor HTTP requests and identify any suspicious requests being sent to the Gibbon CMS.
disclosure
Exploit-Status
EPSS
0.13% (33% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2025-26211 is to upgrade Gibbon CMS to version 29.0.00 or later, which includes the fix for this vulnerability. If upgrading immediately is not possible, consider implementing temporary workarounds such as adding CSRF tokens to all sensitive forms and actions within the CMS. Implementing a Web Application Firewall (WAF) with CSRF protection rules can also help to mitigate the risk. Regularly review and audit CMS configurations to ensure best practices are followed.
Aktualisieren Sie Gibbon auf Version 29.0.00 oder höher. Diese Version enthält eine Korrektur für die CSRF-Vulnerabilität. Die Aktualisierung kann über das Gibbon-Admin-Panel durchgeführt oder die neue Version von der offiziellen Website heruntergeladen und die vorhandenen Dateien ersetzt werden.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-26211 is a Cross-Site Request Forgery (CSRF) vulnerability affecting Gibbon CMS versions before 29.0.00, allowing attackers to perform unauthorized actions.
You are affected if you are using Gibbon CMS versions 0.0 through 29.0.00. Upgrade to 29.0.00 to mitigate the risk.
Upgrade Gibbon CMS to version 29.0.00 or later. Consider CSRF token implementation as a temporary workaround.
No active exploitation campaigns are currently known, but the ease of CSRF exploitation means it remains a potential threat.
Refer to the Gibbon CMS official website and security announcements for the latest information and advisory regarding CVE-2025-26211.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.