Authentication Bypass Vulnerability in zhenfeng13 My-Blog
CVE-2025-9100

6.9MEDIUM

Key Information:

Vendor

Zhenfeng13

Status
Vendor
CVE Published:
18 August 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2025-9100?

A vulnerability has been identified in zhenfeng13 My-Blog version 1.0.0, specifically within the Frontend Blog Article Comment Handler. This flaw enables an attacker to bypass authentication through a capture-replay technique, potentially allowing unauthorized access to sensitive comment functionalities. The exploit can be executed remotely, posing a significant risk to users and their data. As this information is publicly disclosed, it underscores the urgency for affected users to implement immediate corrective measures to safeguard their installations.

Affected Version(s)

My-Blog 1.0.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

ZAST.AI (VulDB User)
.
CVE-2025-9100 : Authentication Bypass Vulnerability in zhenfeng13 My-Blog