CVE-2025-24021: CWE-862: Missing Authorization in Combodo iTop
iTop is an web based IT Service Management tool. Prior to versions 2.7.12, 3.1.3, and 3.2.1, anyone with an account having portal access can set value to object fields when they're not supposed to. Versions 2.7.12, 3.1.3, and 3.2.1 contain a fix for the issue.
AI Analysis
Technical Summary
CVE-2025-24021 is a medium-severity vulnerability identified in Combodo's iTop, a web-based IT Service Management (ITSM) tool widely used for managing IT infrastructure and services. The vulnerability is classified under CWE-862, indicating a Missing Authorization issue. Specifically, in versions prior to 2.7.12, between 3.0.0 and before 3.1.3, and between 3.2.0 and before 3.2.1, any user with portal access—meaning any authenticated user with a portal account—can set or modify object field values that they should not be authorized to change. This lack of proper authorization checks allows users to escalate their privileges within the application context by altering data fields that are typically restricted. The vulnerability does not require user interaction beyond having a valid portal account and can be exploited remotely over the network (AV:N). The attack complexity is low (AC:L), and the attacker must have low privileges (PR:L) but no additional user interaction is needed (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact is limited to integrity (I:L), with no direct confidentiality or availability impact. The issue was addressed in versions 2.7.12, 3.1.3, and 3.2.1 by implementing proper authorization checks to restrict unauthorized field modifications. No known exploits are currently reported in the wild, but the vulnerability's nature makes it a potential vector for unauthorized data manipulation within ITSM environments.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on iTop for IT service management and asset tracking. Unauthorized modification of object fields could lead to inaccurate IT asset records, misconfiguration of services, or manipulation of incident and change management data. This can disrupt IT operations, cause compliance issues, and potentially lead to further security incidents if attackers alter critical configuration data or escalate privileges within the ITSM system. The integrity compromise could undermine trust in IT management processes and complicate incident response efforts. While confidentiality and availability are not directly affected, the integrity loss alone can have cascading effects on operational reliability and regulatory compliance, particularly under GDPR and other European data protection frameworks where accurate record-keeping is essential.
Mitigation Recommendations
European organizations using iTop should immediately verify their deployed versions and upgrade to the fixed releases: 2.7.12, 3.1.3, or 3.2.1 as applicable. Beyond patching, organizations should audit portal user accounts to ensure that only necessary personnel have portal access, minimizing the attack surface. Implement strict role-based access controls (RBAC) within iTop to limit field modification permissions to authorized roles only. Regularly review and monitor audit logs for unusual changes to object fields, enabling early detection of unauthorized modifications. Network segmentation can be employed to restrict access to the iTop portal to trusted internal networks or VPN users. Additionally, consider implementing web application firewalls (WAF) with custom rules to detect and block anomalous requests attempting unauthorized field changes. Finally, integrate iTop security monitoring into the organization's broader security information and event management (SIEM) system for comprehensive oversight.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-24021: CWE-862: Missing Authorization in Combodo iTop
Description
iTop is an web based IT Service Management tool. Prior to versions 2.7.12, 3.1.3, and 3.2.1, anyone with an account having portal access can set value to object fields when they're not supposed to. Versions 2.7.12, 3.1.3, and 3.2.1 contain a fix for the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-24021 is a medium-severity vulnerability identified in Combodo's iTop, a web-based IT Service Management (ITSM) tool widely used for managing IT infrastructure and services. The vulnerability is classified under CWE-862, indicating a Missing Authorization issue. Specifically, in versions prior to 2.7.12, between 3.0.0 and before 3.1.3, and between 3.2.0 and before 3.2.1, any user with portal access—meaning any authenticated user with a portal account—can set or modify object field values that they should not be authorized to change. This lack of proper authorization checks allows users to escalate their privileges within the application context by altering data fields that are typically restricted. The vulnerability does not require user interaction beyond having a valid portal account and can be exploited remotely over the network (AV:N). The attack complexity is low (AC:L), and the attacker must have low privileges (PR:L) but no additional user interaction is needed (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact is limited to integrity (I:L), with no direct confidentiality or availability impact. The issue was addressed in versions 2.7.12, 3.1.3, and 3.2.1 by implementing proper authorization checks to restrict unauthorized field modifications. No known exploits are currently reported in the wild, but the vulnerability's nature makes it a potential vector for unauthorized data manipulation within ITSM environments.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on iTop for IT service management and asset tracking. Unauthorized modification of object fields could lead to inaccurate IT asset records, misconfiguration of services, or manipulation of incident and change management data. This can disrupt IT operations, cause compliance issues, and potentially lead to further security incidents if attackers alter critical configuration data or escalate privileges within the ITSM system. The integrity compromise could undermine trust in IT management processes and complicate incident response efforts. While confidentiality and availability are not directly affected, the integrity loss alone can have cascading effects on operational reliability and regulatory compliance, particularly under GDPR and other European data protection frameworks where accurate record-keeping is essential.
Mitigation Recommendations
European organizations using iTop should immediately verify their deployed versions and upgrade to the fixed releases: 2.7.12, 3.1.3, or 3.2.1 as applicable. Beyond patching, organizations should audit portal user accounts to ensure that only necessary personnel have portal access, minimizing the attack surface. Implement strict role-based access controls (RBAC) within iTop to limit field modification permissions to authorized roles only. Regularly review and monitor audit logs for unusual changes to object fields, enabling early detection of unauthorized modifications. Network segmentation can be employed to restrict access to the iTop portal to trusted internal networks or VPN users. Additionally, consider implementing web application firewalls (WAF) with custom rules to detect and block anomalous requests attempting unauthorized field changes. Finally, integrate iTop security monitoring into the organization's broader security information and event management (SIEM) system for comprehensive oversight.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-01-16T17:31:06.459Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec9c6
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 8/30/2025, 1:01:50 AM
Last updated: 9/26/2025, 3:51:59 PM
Views: 17
Related Threats
CVE-2025-11054: SQL Injection in itsourcecode Open Source Job Portal
MediumCVE-2025-9816: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in veronalabs WP Statistics – Simple, privacy-friendly Google Analytics alternative
HighCVE-2025-11050: Improper Authorization in Portabilis i-Educar
MediumCVE-2025-10499: CWE-352 Cross-Site Request Forgery (CSRF) in kstover Ninja Forms – The Contact Form Builder That Grows With You
MediumCVE-2025-10498: CWE-352 Cross-Site Request Forgery (CSRF) in kstover Ninja Forms – The Contact Form Builder That Grows With You
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.