[Japanese]

JVNDB-2025-000061

Multiple vulnerabilities in Movable Type

Overview

Movable Type provided by Six Apart Ltd. contains multiple vulnerabilities listed below.
  • Use of less trusted source (CWE-348) - CVE-2025-53522

  • Open redirect (CWE-601) - CVE-2025-55706

Six Apart Ltd. reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.
JPCERT/CC and Six Apart Ltd. coordinated under the Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 5.3 (Medium) [IPA Score]
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: None
  • Integrity Impact: Low
  • Availability Impact: None
The above CVSS base scores have been assigned for CVE-2025-53522


CVSS V3 Severity:
Base Metrics:4.3 (Medium) [IPA Score]
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: Required
  • Scope: Unchanged
  • Confidentiality Impact: None
  • Integrity Impact: Low
  • Availability Impact: None
The above CVSS base scores have been assigned for CVE-2025-55706
Affected Products


Six Apart, Ltd.
  • Movable Type 8.0.0 to 8.0.6, 8.4.0 to 8.4.2 (8 series)
  • Movable Type 7 r.5508 and earlier (7 series)
  • Movable Type Cloud Edition 8.6.0 (8 series)
  • Movable Type Cloud Edition 7 r.5508 (7 series)
  • Movable Type Advanced 8.0.0 to 8.0.6, 8.4.0 to 8.4.2 (8 series)
  • Movable Type Advanced 7 r.5508 and earlier (7 series)
  • Movable Type Premium 2.09 and earlier (2 series)
  • Movable Type Premium 1.66 and earlier (1 series)
  • Movable Type Premium Cloud Edition 2.09 (2 series)
  • Movable Type Premium Cloud Edition 1.66 (1 series)
  • Movable Type Premium (Advanced Edition) 2.09 and earlier (2 series)
  • Movable Type Premium (Advanced Edition) 1.66 and earlier (1 series)

Impact

  • Tampered email to reset a password may be sent by a remote unauthenticated attacker (CVE-2025-53522)

  • An invalid parameter may be inserted into the password reset page, which may lead to redirection to an arbitrary URL (CVE-2025-55706)
Solution

[Update the Software]
Apply the appropriate update according to the information provided by the developer.
The developer has released the following updates that contain fixes for these vulnerabilities.
  • Movable Type / Movable Type Advanced 8.7.0 (Only available in Cloud Edition)

  • Movable Type / Movable Type Advanced 8.0.7, 8.4.3 (Only available in Software Edition)

  • Movable Type / Movable Type Advanced 7 r.5509

  • Movable Type Premium / Movable Type Premium (Advanced Edition) 2.10

  • Movable Type Premium / Movable Type Premium (Advanced Edition) 1.67

For more information, refer to the information provided by the developer.
Vendor Information

Six Apart, Ltd.
CWE (What is CWE?)

  1. No Mapping(CWE-Other) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2025-53522
  2. CVE-2025-55706
References

  1. JVN : JVN#76729865
Revision History

  • [2025/08/20]
      Web page was published