Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14660: Improper Access Controls in DecoCMS Mesh

0
Medium
VulnerabilityCVE-2025-14660cvecve-2025-14660
Published: Sun Dec 14 2025 (12/14/2025, 12:32:08 UTC)
Source: CVE Database V5
Vendor/Project: DecoCMS
Product: Mesh

Description

A flaw has been found in DecoCMS Mesh up to 1.0.0-alpha.31. Affected by this vulnerability is the function createTool of the file packages/sdk/src/mcp/teams/api.ts of the component Workspace Domain Handler. This manipulation of the argument domain causes improper access controls. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been published and may be used. Upgrading to version 1.0.0-alpha.32 addresses this issue. Patch name: 5f7315e05852faf3a9c177c0a34f9ea9b0371d3d. It is recommended to upgrade the affected component.

AI-Powered Analysis

AILast updated: 12/14/2025, 13:46:57 UTC

Technical Analysis

CVE-2025-14660 identifies an improper access control vulnerability in DecoCMS Mesh, specifically in the createTool function within the Workspace Domain Handler component (file packages/sdk/src/mcp/teams/api.ts). This vulnerability arises from insufficient validation or enforcement of permissions on the domain argument passed to createTool, enabling remote attackers to manipulate this parameter and bypass intended access restrictions. The flaw affects all versions up to 1.0.0-alpha.31. The attack vector is network-based with no authentication or user interaction required, but the attack complexity is rated high due to the need for precise manipulation and understanding of the system's internal domain handling. The vulnerability impacts confidentiality, integrity, and availability at a low level, as unauthorized access could lead to limited unauthorized actions within the workspace domain context. The vendor has addressed the issue in version 1.0.0-alpha.32, and a patch is available. Although an exploit has been published, there are no confirmed reports of active exploitation in the wild. The vulnerability is tracked with a CVSS 4.0 base score of 6.3, reflecting medium severity, with network attack vector, high complexity, no privileges or user interaction required, and low impact on confidentiality, integrity, and availability.

Potential Impact

For European organizations deploying DecoCMS Mesh, this vulnerability poses a risk of unauthorized access to workspace domain functionalities, potentially allowing attackers to create or manipulate tools or resources within the affected component. While the impact on confidentiality, integrity, and availability is low, unauthorized access could lead to data exposure or manipulation within the CMS environment, disrupting business operations or compromising sensitive content. Given the remote attack vector and lack of required authentication, organizations with externally accessible DecoCMS Mesh instances are at higher risk. The high complexity of exploitation reduces the likelihood of widespread attacks, but targeted attacks against organizations using this CMS are plausible. The presence of a published exploit increases the urgency for patching. Failure to address this vulnerability could result in compliance issues with European data protection regulations if sensitive data is exposed or integrity is compromised.

Mitigation Recommendations

European organizations should immediately upgrade DecoCMS Mesh to version 1.0.0-alpha.32 or later to remediate the vulnerability. Network-level protections such as restricting access to DecoCMS Mesh management interfaces to trusted IP ranges or VPNs can reduce exposure. Implement strict monitoring and logging of workspace domain activities to detect anomalous behavior indicative of exploitation attempts. Conduct regular security assessments and code reviews of custom CMS integrations to identify similar access control weaknesses. Employ web application firewalls (WAFs) with rules tailored to detect and block suspicious API calls targeting the createTool function or related endpoints. Educate development and operations teams about the importance of access control validation in CMS components. Finally, maintain an up-to-date inventory of DecoCMS Mesh deployments across the organization to ensure timely patch management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-13T13:25:14.748Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693ebe20cd21bcc771e7ab9c

Added to database: 12/14/2025, 1:39:44 PM

Last enriched: 12/14/2025, 1:46:57 PM

Last updated: 12/15/2025, 3:55:25 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats