CVE-2025-35431: CWE-90 Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') in CISA Thorium
CISA Thorium does not escape user controlled strings used in LDAP queries. An authenticated remote attacker can modify LDAP authorization data such as group memberships. Fixed in 1.1.1.
AI Analysis
Technical Summary
CVE-2025-35431 is a medium severity vulnerability classified under CWE-90, which pertains to improper neutralization of special elements used in LDAP queries, commonly known as LDAP Injection. This vulnerability affects CISA Thorium version 1.0.0, where user-controlled input strings are not properly escaped before being incorporated into LDAP queries. LDAP Injection occurs when an attacker manipulates input fields that are used to construct LDAP queries, allowing them to alter the logic of these queries. In this case, an authenticated remote attacker can exploit this flaw to modify LDAP authorization data, such as group memberships. This could enable unauthorized privilege escalation or unauthorized access to resources by changing group memberships or other authorization attributes stored in the LDAP directory. The vulnerability does not require user interaction but does require the attacker to have some level of authenticated access (low privilege). The CVSS v3.1 base score is 5.4 (medium), reflecting that the attack vector is network-based, with low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity to a limited extent without affecting availability. The issue has been fixed in version 1.1.1 of CISA Thorium. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations using CISA Thorium 1.0.0, this vulnerability poses a risk of unauthorized privilege escalation within their LDAP-based authorization systems. Since LDAP is commonly used for centralized authentication and authorization in enterprise environments, manipulation of group memberships can lead to unauthorized access to sensitive systems or data. This can compromise confidentiality and integrity of organizational data and potentially disrupt compliance with data protection regulations such as GDPR. The impact is particularly significant for organizations relying heavily on LDAP for access control, including government agencies, financial institutions, healthcare providers, and large enterprises. The requirement for authenticated access somewhat limits the attack surface but insider threats or compromised credentials could be leveraged by attackers. The absence of known exploits reduces immediate risk but organizations should prioritize patching to prevent future exploitation.
Mitigation Recommendations
European organizations should immediately upgrade CISA Thorium to version 1.1.1 or later, where the vulnerability is fixed. Until patching is possible, organizations should implement strict access controls and monitoring on accounts with LDAP query privileges to detect anomalous changes in group memberships or authorization data. Employing multi-factor authentication (MFA) can reduce the risk of credential compromise. Additionally, input validation and sanitization should be enforced at the application layer to prevent injection attacks. Regular auditing of LDAP directory changes and integration with Security Information and Event Management (SIEM) systems can help detect suspicious activities. Network segmentation and limiting LDAP query capabilities to trusted systems can further reduce exposure. Finally, educating administrators and users about the risks of credential compromise and monitoring for unusual authentication patterns will enhance defense in depth.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-35431: CWE-90 Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') in CISA Thorium
Description
CISA Thorium does not escape user controlled strings used in LDAP queries. An authenticated remote attacker can modify LDAP authorization data such as group memberships. Fixed in 1.1.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-35431 is a medium severity vulnerability classified under CWE-90, which pertains to improper neutralization of special elements used in LDAP queries, commonly known as LDAP Injection. This vulnerability affects CISA Thorium version 1.0.0, where user-controlled input strings are not properly escaped before being incorporated into LDAP queries. LDAP Injection occurs when an attacker manipulates input fields that are used to construct LDAP queries, allowing them to alter the logic of these queries. In this case, an authenticated remote attacker can exploit this flaw to modify LDAP authorization data, such as group memberships. This could enable unauthorized privilege escalation or unauthorized access to resources by changing group memberships or other authorization attributes stored in the LDAP directory. The vulnerability does not require user interaction but does require the attacker to have some level of authenticated access (low privilege). The CVSS v3.1 base score is 5.4 (medium), reflecting that the attack vector is network-based, with low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity to a limited extent without affecting availability. The issue has been fixed in version 1.1.1 of CISA Thorium. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations using CISA Thorium 1.0.0, this vulnerability poses a risk of unauthorized privilege escalation within their LDAP-based authorization systems. Since LDAP is commonly used for centralized authentication and authorization in enterprise environments, manipulation of group memberships can lead to unauthorized access to sensitive systems or data. This can compromise confidentiality and integrity of organizational data and potentially disrupt compliance with data protection regulations such as GDPR. The impact is particularly significant for organizations relying heavily on LDAP for access control, including government agencies, financial institutions, healthcare providers, and large enterprises. The requirement for authenticated access somewhat limits the attack surface but insider threats or compromised credentials could be leveraged by attackers. The absence of known exploits reduces immediate risk but organizations should prioritize patching to prevent future exploitation.
Mitigation Recommendations
European organizations should immediately upgrade CISA Thorium to version 1.1.1 or later, where the vulnerability is fixed. Until patching is possible, organizations should implement strict access controls and monitoring on accounts with LDAP query privileges to detect anomalous changes in group memberships or authorization data. Employing multi-factor authentication (MFA) can reduce the risk of credential compromise. Additionally, input validation and sanitization should be enforced at the application layer to prevent injection attacks. Regular auditing of LDAP directory changes and integration with Security Information and Event Management (SIEM) systems can help detect suspicious activities. Network segmentation and limiting LDAP query capabilities to trusted systems can further reduce exposure. Finally, educating administrators and users about the risks of credential compromise and monitoring for unusual authentication patterns will enhance defense in depth.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- cisa-cg
- Date Reserved
- 2025-04-15T20:57:14.280Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68cae909b253b63d00f0f6c8
Added to database: 9/17/2025, 4:59:53 PM
Last enriched: 9/17/2025, 5:01:18 PM
Last updated: 9/17/2025, 5:01:18 PM
Views: 2
Related Threats
CVE-2025-10644: CWE-266: Incorrect Privilege Assignment in Wondershare Repairit
CriticalCVE-2025-10643: CWE-732: Incorrect Permission Assignment for Critical Resource in Wondershare Repairit
CriticalCVE-2025-10617: SQL Injection in SourceCodester Online Polling System
MediumCVE-2025-10616: Unrestricted Upload in itsourcecode E-Commerce Website
MediumCVE-2025-59340: CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine in HubSpot jinjava
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.