CVE-2025-36857: CWE-276 Incorrect Default Permissions in Rapid7 Appspider Pro
Rapid7 Appspider Pro versions below 7.5.021, suffer from a broken access control vulnerability in the application's configuration file loading mechanism, whereby an attacker can place files in directories belonging to other users or projects. Affected versions allow standard users to add custom configuration files. These files, which are loaded in alphabetical order, can override or change the settings of the original configuration files, creating a security vulnerability. This issue stems from improper directory access management. This vulnerability was remediated in version 7.5.021 of the product.
AI Analysis
Technical Summary
CVE-2025-36857 is a vulnerability identified in Rapid7 Appspider Pro versions prior to 7.5.021. The issue arises from incorrect default permissions related to the application's configuration file loading mechanism. Specifically, the vulnerability is a broken access control flaw (CWE-276) that allows standard users to place custom configuration files into directories belonging to other users or projects. The application loads configuration files in alphabetical order, which means that an attacker can craft and insert malicious or altered configuration files that override or modify the settings of legitimate configuration files. This improper directory access management can lead to unauthorized changes in application behavior or settings. The vulnerability does not allow direct compromise of confidentiality or availability but impacts integrity by enabling unauthorized modification of configuration files. The flaw requires local access with standard user privileges (AV:L, PR:L) and does not require user interaction (UI:N). The CVSS v3.1 base score is 3.3, indicating a low severity level. The vulnerability was addressed and remediated in version 7.5.021 of Appspider Pro. There are no known exploits in the wild at this time.
Potential Impact
For European organizations using vulnerable versions of Rapid7 Appspider Pro, this vulnerability could allow malicious insiders or compromised standard user accounts to alter application configurations improperly. While the impact on confidentiality and availability is minimal, the integrity of the scanning or security assessment process could be undermined. This could lead to inaccurate vulnerability assessments or bypassing of security controls configured via these files. In regulated industries or organizations relying heavily on Appspider Pro for security validation, such integrity compromises could result in compliance issues or delayed detection of real threats. However, since exploitation requires local access with standard privileges and no remote exploitation vector is indicated, the risk is primarily internal or limited to users with some system access.
Mitigation Recommendations
European organizations should ensure that all instances of Rapid7 Appspider Pro are updated to version 7.5.021 or later, where this vulnerability has been fixed. Additionally, organizations should enforce strict file system permissions on directories used by Appspider Pro to prevent unauthorized users from placing or modifying configuration files outside their own scope. Implementing monitoring and alerting on changes to configuration directories can help detect unauthorized modifications. Limiting the number of users with local access to systems running Appspider Pro and applying the principle of least privilege will reduce the risk of exploitation. Regular audits of user permissions and configuration file integrity checks can further mitigate risks. Finally, organizations should consider isolating Appspider Pro environments to trusted users only and use endpoint security controls to prevent unauthorized file writes.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-36857: CWE-276 Incorrect Default Permissions in Rapid7 Appspider Pro
Description
Rapid7 Appspider Pro versions below 7.5.021, suffer from a broken access control vulnerability in the application's configuration file loading mechanism, whereby an attacker can place files in directories belonging to other users or projects. Affected versions allow standard users to add custom configuration files. These files, which are loaded in alphabetical order, can override or change the settings of the original configuration files, creating a security vulnerability. This issue stems from improper directory access management. This vulnerability was remediated in version 7.5.021 of the product.
AI-Powered Analysis
Technical Analysis
CVE-2025-36857 is a vulnerability identified in Rapid7 Appspider Pro versions prior to 7.5.021. The issue arises from incorrect default permissions related to the application's configuration file loading mechanism. Specifically, the vulnerability is a broken access control flaw (CWE-276) that allows standard users to place custom configuration files into directories belonging to other users or projects. The application loads configuration files in alphabetical order, which means that an attacker can craft and insert malicious or altered configuration files that override or modify the settings of legitimate configuration files. This improper directory access management can lead to unauthorized changes in application behavior or settings. The vulnerability does not allow direct compromise of confidentiality or availability but impacts integrity by enabling unauthorized modification of configuration files. The flaw requires local access with standard user privileges (AV:L, PR:L) and does not require user interaction (UI:N). The CVSS v3.1 base score is 3.3, indicating a low severity level. The vulnerability was addressed and remediated in version 7.5.021 of Appspider Pro. There are no known exploits in the wild at this time.
Potential Impact
For European organizations using vulnerable versions of Rapid7 Appspider Pro, this vulnerability could allow malicious insiders or compromised standard user accounts to alter application configurations improperly. While the impact on confidentiality and availability is minimal, the integrity of the scanning or security assessment process could be undermined. This could lead to inaccurate vulnerability assessments or bypassing of security controls configured via these files. In regulated industries or organizations relying heavily on Appspider Pro for security validation, such integrity compromises could result in compliance issues or delayed detection of real threats. However, since exploitation requires local access with standard privileges and no remote exploitation vector is indicated, the risk is primarily internal or limited to users with some system access.
Mitigation Recommendations
European organizations should ensure that all instances of Rapid7 Appspider Pro are updated to version 7.5.021 or later, where this vulnerability has been fixed. Additionally, organizations should enforce strict file system permissions on directories used by Appspider Pro to prevent unauthorized users from placing or modifying configuration files outside their own scope. Implementing monitoring and alerting on changes to configuration directories can help detect unauthorized modifications. Limiting the number of users with local access to systems running Appspider Pro and applying the principle of least privilege will reduce the risk of exploitation. Regular audits of user permissions and configuration file integrity checks can further mitigate risks. Finally, organizations should consider isolating Appspider Pro environments to trusted users only and use endpoint security controls to prevent unauthorized file writes.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- rapid7
- Date Reserved
- 2025-04-16T00:09:11.312Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d555d5bcd404e045649dc2
Added to database: 9/25/2025, 2:46:45 PM
Last enriched: 9/25/2025, 2:47:16 PM
Last updated: 9/26/2025, 1:17:47 AM
Views: 7
Related Threats
CVE-2025-9044: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mapster Mapster WP Maps
MediumCVE-2025-11000: NULL Pointer Dereference in Open Babel
MediumCVE-2025-10745: CWE-330 Use of Insufficiently Random Values in specialk Banhammer – Monitor Site Traffic, Block Bad Users and Bots
MediumCVE-2025-10377: CWE-352 Cross-Site Request Forgery (CSRF) in qriouslad System Dashboard
MediumCVE-2025-10173: CWE-862 Missing Authorization in roxnor ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.