CVE-2025-53897

Kiteworks MFT orchestrates end-to-end file transfer workflows. Prior to version 9.1.0, this vulnerability could allow an external attacker to gain access to log information from the system by tricking an administrator into browsing a specifically crafted fake page of Kiteworks MFT. This issue has been patched in version 9.1.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:accellion:kiteworks_managed_file_transfer:*:*:*:*:*:*:*:*

History

03 Dec 2025, 17:48

Type Values Removed Values Added
First Time Accellion kiteworks Managed File Transfer
Accellion
CPE cpe:2.3:a:accellion:kiteworks_managed_file_transfer:*:*:*:*:*:*:*:*
References () https://github.com/kiteworks/security-advisories/security/advisories/GHSA-cxwc-7899-3h4m - () https://github.com/kiteworks/security-advisories/security/advisories/GHSA-cxwc-7899-3h4m - Third Party Advisory, Patch

29 Nov 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-29 03:15

Updated : 2025-12-03 17:48


NVD link : CVE-2025-53897

Mitre link : CVE-2025-53897

CVE.ORG link : CVE-2025-53897


JSON object : View

Products Affected

accellion

  • kiteworks_managed_file_transfer
CWE
CWE-352

Cross-Site Request Forgery (CSRF)