When a user wishes to change his password, the 'updated_ajax' method of the UsersController is called. The vulnerability stems from the use of the dangerous permit! method, which allows all parameters to pass through without any filtering.
No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-6434 | Camaleon CMS Vulnerable to Privilege Escalation through a Mass Assignment |
Github GHSA |
GHSA-rp28-mvq3-wf8j | Camaleon CMS Vulnerable to Privilege Escalation through a Mass Assignment |
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 14 Mar 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 14 Mar 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Privilege Escalation through a Mass Assignment exists in Camaleon CMS When a user wishes to change his password, the 'updated_ajax' method of the UsersController is called. The vulnerability stems from the use of the dangerous permit! method, which allows all parameters to pass through without any filtering. | |
| Title | Camaleon CMS Privilege Escalation | |
| Weaknesses | CWE-915 | |
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2025-03-17T07:45:14.302Z
Reserved: 2025-03-14T11:55:27.845Z
Link: CVE-2025-2304
Updated: 2025-03-14T13:38:23.004Z
Status : Received
Published: 2025-03-14T13:15:41.160
Modified: 2025-03-14T13:15:41.160
Link: CVE-2025-2304
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA