Impact
Winter CMS allows authenticated backend users to modify the roles and permissions assigned to their account through specially crafted requests while logged in. This flaw enables a user to raise their own level of access within the CMS, effectively granting higher privileges than originally granted.
Affected Systems
All releases of Winter CMS older than 1.0.477, version 1.1.12, and version 1.2.12 are affected. The vulnerability is specific to the Winter product from the wintercms vendor.
Risk and Exploitability
The CVSS score is 10, indicating critical severity. The EPSS score is under 1%, suggesting a low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an authenticated backend session and the ability to send crafted requests; a successful exploit would allow the attacker to alter role assignments and elevate privileges.
OpenCVE Enrichment
Github GHSA