An API endpoint that should be limited to web application administrators is hidden from, but accessible by, lower-level read only web application users. The endpoint can be used to import the appliance configuration, allowing an attacker to control the configuration of the appliance, to include granting themselves administrative level permissions.
History

Tue, 29 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 29 Jul 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Xorux
Xorux xormon-ng
Vendors & Products Xorux
Xorux xormon-ng

Mon, 28 Jul 2025 23:45:00 +0000

Type Values Removed Values Added
Description An API endpoint that should be limited to web application administrators is hidden from, but accessible by, lower-level read only web application users. The endpoint can be used to import the appliance configuration, allowing an attacker to control the configuration of the appliance, to include granting themselves administrative level permissions.
Title KL-001-2025-013: Xorux XorMon-NG Web Application Privilege Escalation to Administrator
Weaknesses CWE-648
References

cve-icon MITRE

Status: PUBLISHED

Assigner: KoreLogic

Published:

Updated: 2025-07-29T13:30:23.481Z

Reserved: 2025-07-28T16:02:18.185Z

Link: CVE-2025-54765

cve-icon Vulnrichment

Updated: 2025-07-29T13:30:16.029Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-29T00:15:23.737

Modified: 2025-07-29T14:15:37.427

Link: CVE-2025-54765

cve-icon Redhat

No data.