UsersController::edit in Cerebrate before 1.30 allows an authenticated non-privileged user to escalate their privileges (e.g., obtain a higher role such as admin) via the user-edit endpoint by supplying or modifying role_id or organisation_id fields in the edit request.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 28 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 28 Nov 2025 07:00:00 +0000

Type Values Removed Values Added
Description UsersController::edit in Cerebrate before 1.30 allows an authenticated non-privileged user to escalate their privileges (e.g., obtain a higher role such as admin) via the user-edit endpoint by supplying or modifying role_id or organisation_id fields in the edit request.
First Time appeared Cerebrate-project
Cerebrate-project cerebrate
Weaknesses CWE-472
CPEs cpe:2.3:a:cerebrate-project:cerebrate:*:*:*:*:*:*:*:*
Vendors & Products Cerebrate-project
Cerebrate-project cerebrate
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-28T15:18:23.211Z

Reserved: 2025-11-28T00:00:00.000Z

Link: CVE-2025-66385

cve-icon Vulnrichment

Updated: 2025-11-28T15:18:20.551Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-28T07:15:59.700

Modified: 2025-12-01T15:39:33.110

Link: CVE-2025-66385

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.