When a user wishes to change his password, the 'updated_ajax' method of the UsersController is called. The vulnerability stems from the use of the dangerous permit! method, which allows all parameters to pass through without any filtering.
Project Subscriptions
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-6434 | Camaleon CMS Vulnerable to Privilege Escalation through a Mass Assignment |
Github GHSA |
GHSA-rp28-mvq3-wf8j | Camaleon CMS Vulnerable to Privilege Escalation through a Mass Assignment |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 14 Mar 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 14 Mar 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Privilege Escalation through a Mass Assignment exists in Camaleon CMS When a user wishes to change his password, the 'updated_ajax' method of the UsersController is called. The vulnerability stems from the use of the dangerous permit! method, which allows all parameters to pass through without any filtering. | |
| Title | Camaleon CMS Privilege Escalation | |
| Weaknesses | CWE-915 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2025-03-17T07:45:14.302Z
Reserved: 2025-03-14T11:55:27.845Z
Link: CVE-2025-2304
Updated: 2025-03-14T13:38:23.004Z
Status : Received
Published: 2025-03-14T13:15:41.160
Modified: 2025-03-14T13:15:41.160
Link: CVE-2025-2304
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA