A Privilege Escalation through a Mass Assignment exists in Camaleon CMS When a user wishes to change his password, the 'updated_ajax' method of the UsersController is called. The vulnerability stems from the use of the dangerous permit! method, which allows all parameters to pass through without any filtering.
History

Fri, 14 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 14 Mar 2025 13:00:00 +0000

Type Values Removed Values Added
Description A Privilege Escalation through a Mass Assignment exists in Camaleon CMS When a user wishes to change his password, the 'updated_ajax' method of the UsersController is called. The vulnerability stems from the use of the dangerous permit! method, which allows all parameters to pass through without any filtering.
Title Camaleon CMS Privilege Escalation
Weaknesses CWE-915
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: tenable

Published:

Updated: 2025-03-17T07:45:14.302Z

Reserved: 2025-03-14T11:55:27.845Z

Link: CVE-2025-2304

cve-icon Vulnrichment

Updated: 2025-03-14T13:38:23.004Z

cve-icon NVD

Status : Received

Published: 2025-03-14T13:15:41.160

Modified: 2025-03-14T13:15:41.160

Link: CVE-2025-2304

cve-icon Redhat

No data.