Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10352: CWE-862 Missing Authorization in Melis Technology Melis Platform

0
Critical
VulnerabilityCVE-2025-10352cvecve-2025-10352cwe-862
Published: Wed Oct 08 2025 (10/08/2025, 10:46:40 UTC)
Source: CVE Database V5
Vendor/Project: Melis Technology
Product: Melis Platform

Description

Vulnerability in the melis-core module of Melis Technology's Melis Platform, which, if exploited, allows an unauthenticated attacker to create an administrator account via a request to '/melis/MelisCore/ToolUser/addNewUser'.

AI-Powered Analysis

AILast updated: 12/22/2025, 18:41:47 UTC

Technical Analysis

CVE-2025-10352 is a critical security vulnerability identified in the melis-core module of Melis Technology's Melis Platform. The flaw is classified as CWE-862, indicating a missing authorization control. Specifically, the vulnerability allows an unauthenticated attacker to create a new administrator account by sending a crafted HTTP request to the endpoint '/melis/MelisCore/ToolUser/addNewUser'. Because the endpoint lacks proper authorization checks, no authentication or user interaction is required to exploit this issue. The attacker gains full administrative privileges, enabling them to manipulate system configurations, access sensitive data, and potentially disrupt platform availability. The vulnerability affects version 0 of the Melis Platform, with no patches currently available. The CVSS 4.0 base score of 9.3 reflects the ease of exploitation (network attack vector, no privileges or user interaction required) and the severe impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild, the critical nature of this vulnerability demands urgent attention. The Melis Platform is used in various enterprise environments, and this vulnerability could lead to full system compromise if exploited.

Potential Impact

For European organizations using the Melis Platform, this vulnerability poses a severe risk. An attacker exploiting this flaw can gain administrative access, leading to unauthorized data access, data manipulation, and potential service disruption. This could result in significant operational downtime, loss of sensitive or personal data, and reputational damage. Given the criticality of administrative privileges, attackers could also deploy ransomware, exfiltrate confidential information, or pivot to other internal systems. Compliance with GDPR and other data protection regulations could be jeopardized due to unauthorized data exposure. The lack of authentication requirement increases the likelihood of automated attacks and widespread exploitation if the platform is exposed to the internet. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on the Melis Platform are particularly vulnerable to severe consequences.

Mitigation Recommendations

1. Immediately restrict external access to the Melis Platform, especially the '/melis/MelisCore/ToolUser/addNewUser' endpoint, using network-level controls such as firewalls or VPNs. 2. Implement Web Application Firewall (WAF) rules to detect and block unauthorized requests targeting this endpoint. 3. Conduct a thorough audit of existing user accounts to identify any unauthorized administrator accounts and remove them. 4. Monitor logs for suspicious activity related to user creation or privilege escalation attempts. 5. Engage with Melis Technology for official patches or updates and apply them as soon as they become available. 6. If patching is delayed, consider deploying custom authorization checks or reverse proxies to enforce authentication on vulnerable endpoints. 7. Educate system administrators about this vulnerability and enforce strict credential management and multi-factor authentication for all administrative accounts. 8. Regularly review and update incident response plans to include scenarios involving unauthorized administrative access.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2025-09-12T10:35:02.488Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e642d5f468503fc453c25b

Added to database: 10/8/2025, 10:54:13 AM

Last enriched: 12/22/2025, 6:41:47 PM

Last updated: 1/7/2026, 8:49:12 AM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats