Impact
The vulnerability is a missing authorization check in the update role endpoint of Brave CMS. Any authenticated user can post to the /rights/update-role/{id} route without the required middleware, allowing them to modify another user's role and promote themselves to Super Admin. This grants full administrative control over the system, compromising confidentiality, integrity, and availability.
Affected Systems
The problem exists in Ajax30’s BraveCMS versions earlier than 2.0.6. All releases through 2.0.5 are affected; the issue was fixed in 2.0.6 and later versions.
Risk and Exploitability
With a CVSS score of 8.8, this vulnerability is considered high severity. No EPSS score is provided, and it is not listed in CISA’s KEV catalog. The exploit requires only valid authentication on the site, making it likely that any insider or compromised user can abuse it. Once a user elevates to Super Admin, they gain unrestricted access to the CMS, making the risk significant and justifying urgent remediation.
OpenCVE Enrichment