When a user wishes to change his password, the 'updated_ajax' method of the UsersController is called. The vulnerability stems from the use of the dangerous permit! method, which allows all parameters to pass through without any filtering.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-6434 | Camaleon CMS Vulnerable to Privilege Escalation through a Mass Assignment |
Github GHSA |
GHSA-rp28-mvq3-wf8j | Camaleon CMS Vulnerable to Privilege Escalation through a Mass Assignment |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 14 Mar 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 14 Mar 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Privilege Escalation through a Mass Assignment exists in Camaleon CMS When a user wishes to change his password, the 'updated_ajax' method of the UsersController is called. The vulnerability stems from the use of the dangerous permit! method, which allows all parameters to pass through without any filtering. | |
| Title | Camaleon CMS Privilege Escalation | |
| Weaknesses | CWE-915 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2025-03-17T07:45:14.302Z
Reserved: 2025-03-14T11:55:27.845Z
Link: CVE-2025-2304
Updated: 2025-03-14T13:38:23.004Z
Status : Received
Published: 2025-03-14T13:15:41.160
Modified: 2025-03-14T13:15:41.160
Link: CVE-2025-2304
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA