Kiteworks MFT orchestrates end-to-end file transfer workflows. Prior to version 9.1.0, this vulnerability could allow an external attacker to gain access to log information from the system by tricking an administrator into browsing a specifically crafted fake page of Kiteworks MFT. This issue has been patched in version 9.1.0.
References
| Link | Resource |
|---|---|
| https://github.com/kiteworks/security-advisories/security/advisories/GHSA-cxwc-7899-3h4m | Third Party Advisory Patch |
Configurations
History
03 Dec 2025, 17:48
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Accellion kiteworks Managed File Transfer
Accellion |
|
| CPE | cpe:2.3:a:accellion:kiteworks_managed_file_transfer:*:*:*:*:*:*:*:* | |
| References | () https://github.com/kiteworks/security-advisories/security/advisories/GHSA-cxwc-7899-3h4m - Third Party Advisory, Patch |
29 Nov 2025, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-29 03:15
Updated : 2025-12-03 17:48
NVD link : CVE-2025-53897
Mitre link : CVE-2025-53897
CVE.ORG link : CVE-2025-53897
JSON object : View
Products Affected
accellion
- kiteworks_managed_file_transfer
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
