CVE-2025-10352: CWE-862 Missing Authorization in Melis Technology Melis Platform
Vulnerability in the melis-core module of Melis Technology's Melis Platform, which, if exploited, allows an unauthenticated attacker to create an administrator account via a request to '/melis/MelisCore/ToolUser/addNewUser'.
AI Analysis
Technical Summary
CVE-2025-10352 is a critical security vulnerability identified in the melis-core module of Melis Technology's Melis Platform. The flaw is classified as CWE-862, indicating a missing authorization control. Specifically, the vulnerability allows an unauthenticated attacker to create a new administrator account by sending a crafted HTTP request to the endpoint '/melis/MelisCore/ToolUser/addNewUser'. Because the endpoint lacks proper authorization checks, no authentication or user interaction is required to exploit this issue. The attacker gains full administrative privileges, enabling them to manipulate system configurations, access sensitive data, and potentially disrupt platform availability. The vulnerability affects version 0 of the Melis Platform, with no patches currently available. The CVSS 4.0 base score of 9.3 reflects the ease of exploitation (network attack vector, no privileges or user interaction required) and the severe impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild, the critical nature of this vulnerability demands urgent attention. The Melis Platform is used in various enterprise environments, and this vulnerability could lead to full system compromise if exploited.
Potential Impact
For European organizations using the Melis Platform, this vulnerability poses a severe risk. An attacker exploiting this flaw can gain administrative access, leading to unauthorized data access, data manipulation, and potential service disruption. This could result in significant operational downtime, loss of sensitive or personal data, and reputational damage. Given the criticality of administrative privileges, attackers could also deploy ransomware, exfiltrate confidential information, or pivot to other internal systems. Compliance with GDPR and other data protection regulations could be jeopardized due to unauthorized data exposure. The lack of authentication requirement increases the likelihood of automated attacks and widespread exploitation if the platform is exposed to the internet. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on the Melis Platform are particularly vulnerable to severe consequences.
Mitigation Recommendations
1. Immediately restrict external access to the Melis Platform, especially the '/melis/MelisCore/ToolUser/addNewUser' endpoint, using network-level controls such as firewalls or VPNs. 2. Implement Web Application Firewall (WAF) rules to detect and block unauthorized requests targeting this endpoint. 3. Conduct a thorough audit of existing user accounts to identify any unauthorized administrator accounts and remove them. 4. Monitor logs for suspicious activity related to user creation or privilege escalation attempts. 5. Engage with Melis Technology for official patches or updates and apply them as soon as they become available. 6. If patching is delayed, consider deploying custom authorization checks or reverse proxies to enforce authentication on vulnerable endpoints. 7. Educate system administrators about this vulnerability and enforce strict credential management and multi-factor authentication for all administrative accounts. 8. Regularly review and update incident response plans to include scenarios involving unauthorized administrative access.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-10352: CWE-862 Missing Authorization in Melis Technology Melis Platform
Description
Vulnerability in the melis-core module of Melis Technology's Melis Platform, which, if exploited, allows an unauthenticated attacker to create an administrator account via a request to '/melis/MelisCore/ToolUser/addNewUser'.
AI-Powered Analysis
Technical Analysis
CVE-2025-10352 is a critical security vulnerability identified in the melis-core module of Melis Technology's Melis Platform. The flaw is classified as CWE-862, indicating a missing authorization control. Specifically, the vulnerability allows an unauthenticated attacker to create a new administrator account by sending a crafted HTTP request to the endpoint '/melis/MelisCore/ToolUser/addNewUser'. Because the endpoint lacks proper authorization checks, no authentication or user interaction is required to exploit this issue. The attacker gains full administrative privileges, enabling them to manipulate system configurations, access sensitive data, and potentially disrupt platform availability. The vulnerability affects version 0 of the Melis Platform, with no patches currently available. The CVSS 4.0 base score of 9.3 reflects the ease of exploitation (network attack vector, no privileges or user interaction required) and the severe impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild, the critical nature of this vulnerability demands urgent attention. The Melis Platform is used in various enterprise environments, and this vulnerability could lead to full system compromise if exploited.
Potential Impact
For European organizations using the Melis Platform, this vulnerability poses a severe risk. An attacker exploiting this flaw can gain administrative access, leading to unauthorized data access, data manipulation, and potential service disruption. This could result in significant operational downtime, loss of sensitive or personal data, and reputational damage. Given the criticality of administrative privileges, attackers could also deploy ransomware, exfiltrate confidential information, or pivot to other internal systems. Compliance with GDPR and other data protection regulations could be jeopardized due to unauthorized data exposure. The lack of authentication requirement increases the likelihood of automated attacks and widespread exploitation if the platform is exposed to the internet. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on the Melis Platform are particularly vulnerable to severe consequences.
Mitigation Recommendations
1. Immediately restrict external access to the Melis Platform, especially the '/melis/MelisCore/ToolUser/addNewUser' endpoint, using network-level controls such as firewalls or VPNs. 2. Implement Web Application Firewall (WAF) rules to detect and block unauthorized requests targeting this endpoint. 3. Conduct a thorough audit of existing user accounts to identify any unauthorized administrator accounts and remove them. 4. Monitor logs for suspicious activity related to user creation or privilege escalation attempts. 5. Engage with Melis Technology for official patches or updates and apply them as soon as they become available. 6. If patching is delayed, consider deploying custom authorization checks or reverse proxies to enforce authentication on vulnerable endpoints. 7. Educate system administrators about this vulnerability and enforce strict credential management and multi-factor authentication for all administrative accounts. 8. Regularly review and update incident response plans to include scenarios involving unauthorized administrative access.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- INCIBE
- Date Reserved
- 2025-09-12T10:35:02.488Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e642d5f468503fc453c25b
Added to database: 10/8/2025, 10:54:13 AM
Last enriched: 12/22/2025, 6:41:47 PM
Last updated: 1/7/2026, 8:49:12 AM
Views: 86
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.