CVE-2025-0504: CWE-266: Incorrect Privilege Assignment in Black Duck Black Duck SCA
Black Duck SCA versions prior to 2025.10.0 had user role permissions configured in an overly broad manner. Users with the scoped Project Manager user role with the Global User Read access permission enabled access to certain Project Administrator functionalities which should have be inaccessible. Exploitation does not grant full system control, but it may enable unauthorized changes to project configurations or access to system sensitive information.
AI Analysis
Technical Summary
CVE-2025-0504 is a vulnerability identified in Black Duck SCA, a widely used software composition analysis tool for managing open source security and compliance risks. The issue arises from improper configuration of user role permissions in versions prior to 2025.10.0. Specifically, users assigned the scoped Project Manager role combined with Global User Read access can inadvertently gain access to functionalities reserved for Project Administrators. This misconfiguration violates the principle of least privilege, allowing these users to perform unauthorized actions such as modifying project configurations and accessing sensitive system information that should be restricted. The vulnerability is categorized under CWE-266, which concerns incorrect privilege assignment. The CVSS 4.0 vector indicates the attack can be performed remotely (AV:N) with low complexity (AC:L), requires no authentication (PR:L indicates some privileges but not full admin), and no user interaction (UI:N). The impact on confidentiality and integrity is low to moderate, as the attacker cannot gain full system control or execute arbitrary code but can alter project-level settings and view sensitive data. No known exploits have been reported in the wild, but the vulnerability poses a risk to organizations relying on Black Duck SCA for managing open source components. The flaw highlights the importance of correctly scoping user roles and permissions in security-critical tools to prevent privilege escalation and unauthorized access.
Potential Impact
For European organizations, the vulnerability could lead to unauthorized changes in project configurations and exposure of sensitive information within Black Duck SCA environments. This may compromise the integrity of software supply chain management processes, potentially leading to compliance violations or introduction of vulnerabilities in software projects. While the vulnerability does not allow full system compromise, unauthorized configuration changes could disrupt development workflows or weaken security postures. Organizations heavily reliant on Black Duck SCA for open source risk management, especially those in regulated industries such as finance, healthcare, and critical infrastructure, may face increased operational risk and regulatory scrutiny. The risk is amplified in environments where multiple teams share access to Black Duck SCA and where role assignments are not strictly controlled. Additionally, unauthorized access to sensitive project data could aid attackers in crafting targeted attacks or intellectual property theft. The absence of known exploits reduces immediate risk but does not eliminate the potential for future exploitation.
Mitigation Recommendations
European organizations should immediately audit user roles and permissions within Black Duck SCA to ensure that scoped Project Manager roles do not have unintended Global User Read access or access to Project Administrator functionalities. Implement strict role-based access control (RBAC) policies limiting permissions to the minimum necessary for job functions. Monitor logs for unusual access patterns or configuration changes. Plan to upgrade to Black Duck SCA version 2025.10.0 or later once patches are released by the vendor. Until patches are available, consider temporarily restricting Global User Read permissions or segregating duties to reduce risk. Conduct security awareness training for administrators on the importance of correct privilege assignments. Integrate Black Duck SCA access controls with centralized identity and access management (IAM) solutions to enforce consistent policies. Regularly review and update user roles as part of the organization's security governance. Finally, maintain an incident response plan to quickly address any potential misuse of elevated privileges.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland, Belgium, Denmark
CVE-2025-0504: CWE-266: Incorrect Privilege Assignment in Black Duck Black Duck SCA
Description
Black Duck SCA versions prior to 2025.10.0 had user role permissions configured in an overly broad manner. Users with the scoped Project Manager user role with the Global User Read access permission enabled access to certain Project Administrator functionalities which should have be inaccessible. Exploitation does not grant full system control, but it may enable unauthorized changes to project configurations or access to system sensitive information.
AI-Powered Analysis
Technical Analysis
CVE-2025-0504 is a vulnerability identified in Black Duck SCA, a widely used software composition analysis tool for managing open source security and compliance risks. The issue arises from improper configuration of user role permissions in versions prior to 2025.10.0. Specifically, users assigned the scoped Project Manager role combined with Global User Read access can inadvertently gain access to functionalities reserved for Project Administrators. This misconfiguration violates the principle of least privilege, allowing these users to perform unauthorized actions such as modifying project configurations and accessing sensitive system information that should be restricted. The vulnerability is categorized under CWE-266, which concerns incorrect privilege assignment. The CVSS 4.0 vector indicates the attack can be performed remotely (AV:N) with low complexity (AC:L), requires no authentication (PR:L indicates some privileges but not full admin), and no user interaction (UI:N). The impact on confidentiality and integrity is low to moderate, as the attacker cannot gain full system control or execute arbitrary code but can alter project-level settings and view sensitive data. No known exploits have been reported in the wild, but the vulnerability poses a risk to organizations relying on Black Duck SCA for managing open source components. The flaw highlights the importance of correctly scoping user roles and permissions in security-critical tools to prevent privilege escalation and unauthorized access.
Potential Impact
For European organizations, the vulnerability could lead to unauthorized changes in project configurations and exposure of sensitive information within Black Duck SCA environments. This may compromise the integrity of software supply chain management processes, potentially leading to compliance violations or introduction of vulnerabilities in software projects. While the vulnerability does not allow full system compromise, unauthorized configuration changes could disrupt development workflows or weaken security postures. Organizations heavily reliant on Black Duck SCA for open source risk management, especially those in regulated industries such as finance, healthcare, and critical infrastructure, may face increased operational risk and regulatory scrutiny. The risk is amplified in environments where multiple teams share access to Black Duck SCA and where role assignments are not strictly controlled. Additionally, unauthorized access to sensitive project data could aid attackers in crafting targeted attacks or intellectual property theft. The absence of known exploits reduces immediate risk but does not eliminate the potential for future exploitation.
Mitigation Recommendations
European organizations should immediately audit user roles and permissions within Black Duck SCA to ensure that scoped Project Manager roles do not have unintended Global User Read access or access to Project Administrator functionalities. Implement strict role-based access control (RBAC) policies limiting permissions to the minimum necessary for job functions. Monitor logs for unusual access patterns or configuration changes. Plan to upgrade to Black Duck SCA version 2025.10.0 or later once patches are released by the vendor. Until patches are available, consider temporarily restricting Global User Read permissions or segregating duties to reduce risk. Conduct security awareness training for administrators on the importance of correct privilege assignments. Integrate Black Duck SCA access controls with centralized identity and access management (IAM) solutions to enforce consistent policies. Regularly review and update user roles as part of the organization's security governance. Finally, maintain an incident response plan to quickly address any potential misuse of elevated privileges.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- BlackDuck
- Date Reserved
- 2025-01-15T18:37:28.166Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6920de31ac1487f7bb251787
Added to database: 11/21/2025, 9:48:33 PM
Last enriched: 11/21/2025, 10:02:44 PM
Last updated: 11/22/2025, 10:12:19 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13318: CWE-862 Missing Authorization in codepeople Booking Calendar Contact Form
MediumCVE-2025-13136: CWE-862 Missing Authorization in westerndeal GSheetConnector For Ninja Forms
MediumCVE-2025-13384: CWE-862 Missing Authorization in codepeople CP Contact Form with PayPal
HighCVE-2025-13317: CWE-862 Missing Authorization in codepeople Appointment Booking Calendar
MediumCVE-2025-12877: CWE-862 Missing Authorization in themeatelier IDonate – Blood Donation, Request And Donor Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.