Skip to main content

CVE-2025-23974: CWE-266 Incorrect Privilege Assignment in ifkooo One-Login

High
VulnerabilityCVE-2025-23974cvecve-2025-23974cwe-266
Published: Mon Jun 09 2025 (06/09/2025, 15:56:57 UTC)
Source: CVE Database V5
Vendor/Project: ifkooo
Product: One-Login

Description

Incorrect Privilege Assignment vulnerability in ifkooo One-Login allows Privilege Escalation. This issue affects One-Login: from n/a through 1.4.

AI-Powered Analysis

AILast updated: 07/11/2025, 01:32:12 UTC

Technical Analysis

CVE-2025-23974 is a high-severity vulnerability classified under CWE-266 (Incorrect Privilege Assignment) affecting the ifkooo One-Login product up to version 1.4. This vulnerability allows an attacker to escalate privileges due to improper assignment or enforcement of access rights within the One-Login system. The CVSS 3.1 base score of 8.1 indicates a significant risk, with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H showing that the attack can be performed remotely over the network without prior authentication or user interaction, but requires high attack complexity. The vulnerability impacts confidentiality, integrity, and availability to a high degree, meaning an attacker could gain unauthorized access to sensitive data, modify or corrupt data, and disrupt service availability. The lack of available patches or mitigations at the time of publication increases the urgency for affected organizations to implement compensating controls. The vulnerability arises from incorrect privilege assignment, which typically means that roles or permissions are not properly validated or enforced, allowing attackers to perform actions beyond their intended scope. Since One-Login is an identity and access management solution, exploitation could lead to broad access within an organization's IT environment, potentially compromising multiple systems and data stores.

Potential Impact

For European organizations, the impact of this vulnerability is substantial. One-Login is used to centralize authentication and access control, so a successful privilege escalation could allow attackers to bypass security controls, access sensitive personal data protected under GDPR, and manipulate or disrupt critical business operations. The high confidentiality impact raises concerns about data breaches involving personal and corporate information, which could lead to regulatory penalties and reputational damage. Integrity and availability impacts could result in unauthorized changes to user permissions or denial of access to essential services, affecting business continuity. Given the remote exploitability without authentication, attackers could target organizations from outside their network perimeter, increasing the threat landscape. The absence of known exploits in the wild currently provides a window for mitigation, but the high severity score suggests that threat actors may develop exploits soon, especially targeting sectors with valuable data or critical infrastructure.

Mitigation Recommendations

Since no official patches are currently available, European organizations should immediately conduct a thorough audit of their One-Login deployments, focusing on privilege assignments and access control configurations. Implement strict role-based access control (RBAC) policies and verify that no users have excessive privileges beyond their job requirements. Employ network segmentation and firewall rules to restrict access to the One-Login management interfaces to trusted IP addresses only. Monitor authentication and authorization logs for unusual privilege escalation attempts or anomalous access patterns. Consider deploying additional multi-factor authentication (MFA) layers around One-Login administrative accounts to reduce risk. If possible, isolate One-Login instances in a hardened environment with minimal exposure to the internet. Organizations should also engage with ifkooo support channels to obtain updates on patch availability and apply them promptly once released. Finally, prepare incident response plans specifically addressing potential exploitation of privilege escalation vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-01-16T11:33:14.049Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f581b0bd07c3938a791

Added to database: 6/10/2025, 6:54:16 PM

Last enriched: 7/11/2025, 1:32:12 AM

Last updated: 8/4/2025, 4:27:04 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats