CVE-2024-2035: CWE-862 Missing Authorization in zenml-io zenml-io/zenml
An improper authorization vulnerability exists in the zenml-io/zenml repository, specifically within the API PUT /api/v1/users/id endpoint. This vulnerability allows any authenticated user to modify the information of other users, including changing the `active` status of user accounts to false, effectively deactivating them. This issue affects version 0.55.3 and was fixed in version 0.56.2. The impact of this vulnerability is significant as it allows for the deactivation of admin accounts, potentially disrupting the functionality and security of the application.
AI Analysis
Technical Summary
CVE-2024-2035 is classified under CWE-862 (Missing Authorization) and exists in the zenml-io/zenml repository, specifically in the API endpoint PUT /api/v1/users/id. The vulnerability allows any authenticated user to bypass proper authorization checks and modify other users' account information. This includes the ability to change the 'active' status of user accounts to false, effectively deactivating them. Such unauthorized modifications can disrupt the application's normal operations, particularly if administrative accounts are targeted and deactivated, potentially locking out legitimate administrators and impacting system management and security. The vulnerability affects version 0.55.3 of zenml-io/zenml and was addressed in version 0.56.2. The CVSS v3.0 score is 6.5, reflecting a medium severity level with network attack vector, low attack complexity, high privileges required, no user interaction, unchanged scope, no confidentiality impact, but high integrity and availability impacts. No public exploits have been reported to date. The issue arises from missing or insufficient authorization controls on a critical user management API endpoint, allowing privilege escalation through manipulation of user account states.
Potential Impact
For European organizations using zenml-io/zenml version 0.55.3 or earlier, this vulnerability poses a significant risk to operational continuity and security. Unauthorized deactivation of user accounts, especially those with administrative privileges, can lead to denial of service for legitimate users and administrators, disrupting workflows and potentially halting critical data science or machine learning pipelines managed by zenml. The integrity of user management is compromised, allowing malicious insiders or compromised accounts to escalate their influence by disabling other users. This can also lead to reduced availability of the service and increased risk of further exploitation if administrative oversight is lost. Organizations relying on zenml for production environments or sensitive data processing may face operational delays, increased incident response costs, and potential compliance issues if access controls are circumvented.
Mitigation Recommendations
European organizations should immediately verify their zenml-io/zenml deployment versions and upgrade to version 0.56.2 or later where the vulnerability is patched. In addition to upgrading, organizations should implement strict access controls and audit logging around user management APIs to detect and prevent unauthorized modifications. Employ role-based access control (RBAC) to limit which authenticated users can modify user accounts, especially administrative ones. Conduct regular reviews of user account statuses and monitor for unusual deactivation events. Network segmentation and API gateway protections can help restrict access to sensitive endpoints. Where possible, implement multi-factor authentication (MFA) for all users with elevated privileges to reduce the risk of compromised accounts being used to exploit this vulnerability. Finally, integrate vulnerability scanning and penetration testing focused on authorization controls in the CI/CD pipeline to catch similar issues early.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark
CVE-2024-2035: CWE-862 Missing Authorization in zenml-io zenml-io/zenml
Description
An improper authorization vulnerability exists in the zenml-io/zenml repository, specifically within the API PUT /api/v1/users/id endpoint. This vulnerability allows any authenticated user to modify the information of other users, including changing the `active` status of user accounts to false, effectively deactivating them. This issue affects version 0.55.3 and was fixed in version 0.56.2. The impact of this vulnerability is significant as it allows for the deactivation of admin accounts, potentially disrupting the functionality and security of the application.
AI-Powered Analysis
Technical Analysis
CVE-2024-2035 is classified under CWE-862 (Missing Authorization) and exists in the zenml-io/zenml repository, specifically in the API endpoint PUT /api/v1/users/id. The vulnerability allows any authenticated user to bypass proper authorization checks and modify other users' account information. This includes the ability to change the 'active' status of user accounts to false, effectively deactivating them. Such unauthorized modifications can disrupt the application's normal operations, particularly if administrative accounts are targeted and deactivated, potentially locking out legitimate administrators and impacting system management and security. The vulnerability affects version 0.55.3 of zenml-io/zenml and was addressed in version 0.56.2. The CVSS v3.0 score is 6.5, reflecting a medium severity level with network attack vector, low attack complexity, high privileges required, no user interaction, unchanged scope, no confidentiality impact, but high integrity and availability impacts. No public exploits have been reported to date. The issue arises from missing or insufficient authorization controls on a critical user management API endpoint, allowing privilege escalation through manipulation of user account states.
Potential Impact
For European organizations using zenml-io/zenml version 0.55.3 or earlier, this vulnerability poses a significant risk to operational continuity and security. Unauthorized deactivation of user accounts, especially those with administrative privileges, can lead to denial of service for legitimate users and administrators, disrupting workflows and potentially halting critical data science or machine learning pipelines managed by zenml. The integrity of user management is compromised, allowing malicious insiders or compromised accounts to escalate their influence by disabling other users. This can also lead to reduced availability of the service and increased risk of further exploitation if administrative oversight is lost. Organizations relying on zenml for production environments or sensitive data processing may face operational delays, increased incident response costs, and potential compliance issues if access controls are circumvented.
Mitigation Recommendations
European organizations should immediately verify their zenml-io/zenml deployment versions and upgrade to version 0.56.2 or later where the vulnerability is patched. In addition to upgrading, organizations should implement strict access controls and audit logging around user management APIs to detect and prevent unauthorized modifications. Employ role-based access control (RBAC) to limit which authenticated users can modify user accounts, especially administrative ones. Conduct regular reviews of user account statuses and monitor for unusual deactivation events. Network segmentation and API gateway protections can help restrict access to sensitive endpoints. Where possible, implement multi-factor authentication (MFA) for all users with elevated privileges to reduce the risk of compromised accounts being used to exploit this vulnerability. Finally, integrate vulnerability scanning and penetration testing focused on authorization controls in the CI/CD pipeline to catch similar issues early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2024-02-29T19:50:35.229Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b25178f764e1f470b27
Added to database: 10/15/2025, 1:01:25 PM
Last enriched: 10/15/2025, 1:25:10 PM
Last updated: 10/16/2025, 11:20:23 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-58426: Use of hard-coded cryptographic key in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-58079: Improper Protection of Alternate Path in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-55072: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-54859: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-54760: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.