Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 24 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ulicms:ulicms:2023.1:*:*:*:*:*:*:* |
Thu, 18 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 18 Dec 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ulicms
Ulicms ulicms |
|
| Vendors & Products |
Ulicms
Ulicms ulicms |
Wed, 17 Dec 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | UliCMS 2023.1 contains an authentication bypass vulnerability that allows unauthenticated attackers to create admin users through mass assignment in the UserController. Attackers can send a crafted POST request to the admin index.php endpoint with specific parameters to generate an administrative account with full system access. | |
| Title | UliCMS 2023.1 Authentication Bypass via Mass Assignment Vulnerability | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:07:35.092Z
Reserved: 2025-12-16T19:22:09.995Z
Link: CVE-2023-53914
Updated: 2025-12-18T14:50:23.166Z
Status : Analyzed
Published: 2025-12-17T23:15:49.983
Modified: 2025-12-24T17:04:53.853
Link: CVE-2023-53914
No data.
OpenCVE Enrichment
Updated: 2025-12-18T09:55:46Z