Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11957: CWE-639: Authorization Bypass Through User-Controlled Key in Devolutions Server

0
Critical
VulnerabilityCVE-2025-11957cvecve-2025-11957cwe-639
Published: Wed Oct 22 2025 (10/22/2025, 17:09:15 UTC)
Source: CVE Database V5
Vendor/Project: Devolutions
Product: Server

Description

CVE-2025-11957 is a critical authorization bypass vulnerability in Devolutions Server versions 2025. 2. 12. 0 and earlier. It allows an authenticated basic user to exploit improper authorization in the temporary access workflow to self-approve or approve other users' temporary access requests. This flaw enables unauthorized access to sensitive vaults and entries through crafted API requests without requiring user interaction. The vulnerability has a CVSS score of 9. 0, indicating a high-impact, network-exploitable issue with low privileges required but high complexity. No known exploits are currently in the wild. European organizations using Devolutions Server for privileged access management are at risk of unauthorized data exposure and potential lateral movement within their environments.

AI-Powered Analysis

AILast updated: 12/02/2025, 17:49:23 UTC

Technical Analysis

CVE-2025-11957 is an authorization bypass vulnerability categorized under CWE-639, affecting Devolutions Server versions 2025.2.12.0 and earlier. The vulnerability arises from improper authorization checks in the temporary access workflow, which is designed to grant time-limited access to vaults and entries. An authenticated user with basic privileges can manipulate the API requests to self-approve or approve temporary access requests for other users, effectively elevating their access rights without proper approval. This bypass allows unauthorized access to sensitive credentials and secrets stored within the vaults, potentially compromising the confidentiality and integrity of critical systems. The vulnerability is exploitable remotely over the network without user interaction, but requires low privileges (authenticated basic user) and has high attack complexity due to the need to craft specific API requests. The CVSS 4.0 vector indicates high impact on confidentiality, integrity, and availability, with scope and security requirements also high. Although no public exploits are reported yet, the critical nature of the flaw demands urgent attention. Devolutions Server is widely used for privileged access management, making this vulnerability a significant risk for organizations relying on it to secure access to sensitive infrastructure.

Potential Impact

For European organizations, this vulnerability poses a severe risk to the security of privileged credentials and secrets managed within Devolutions Server. Unauthorized access to vaults can lead to credential theft, lateral movement, and potential full compromise of critical IT infrastructure. This can result in data breaches, operational disruption, and regulatory non-compliance, especially under GDPR and other data protection laws. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely heavily on privileged access management are particularly vulnerable. The ability for a low-privileged authenticated user to escalate access undermines trust in access controls and can facilitate insider threats or external attackers who have gained basic user credentials. The network-exploitable nature increases the attack surface, potentially allowing remote exploitation from within corporate networks or VPNs.

Mitigation Recommendations

1. Immediately upgrade Devolutions Server to a version that addresses CVE-2025-11957 once available. 2. Until a patch is released, restrict basic user privileges and review temporary access workflows to limit approval capabilities. 3. Implement strict network segmentation and access controls to limit who can authenticate to the Devolutions Server. 4. Monitor API usage logs for unusual or unauthorized approval activities, focusing on temporary access requests. 5. Enforce multi-factor authentication (MFA) for all users accessing the server to reduce risk of credential misuse. 6. Conduct regular audits of vault access and temporary access approvals to detect anomalies. 7. Educate administrators and users about the risks of improper access approvals and encourage prompt reporting of suspicious behavior. 8. Consider deploying Web Application Firewalls (WAF) or API gateways with custom rules to detect and block suspicious crafted API requests targeting the temporary access workflow.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
DEVOLUTIONS
Date Reserved
2025-10-20T12:21:03.561Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f9120a519b40327236e527

Added to database: 10/22/2025, 5:19:06 PM

Last enriched: 12/2/2025, 5:49:23 PM

Last updated: 12/7/2025, 2:06:21 PM

Views: 130

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats