Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-40571: CWE-266: Incorrect Privilege Assignment in Siemens Mendix OIDC SSO (Mendix 10 compatible)

0
Low
VulnerabilityCVE-2025-40571cvecve-2025-40571cwe-266
Published: Tue May 13 2025 (05/13/2025, 09:38:54 UTC)
Source: CVE
Vendor/Project: Siemens
Product: Mendix OIDC SSO (Mendix 10 compatible)

Description

A vulnerability has been identified in Mendix OIDC SSO (Mendix 10 compatible) (All versions < V4.1.0), Mendix OIDC SSO (Mendix 10.12 compatible) (All versions < V4.0.1), Mendix OIDC SSO (Mendix 9 compatible) (All versions < V3.3.0). The Mendix OIDC SSO module grants read and write access to all tokens exclusively to the Administrator role and could result in privilege misuse by an adversary modifying the module during Mendix development.

AI-Powered Analysis

AILast updated: 11/11/2025, 21:15:33 UTC

Technical Analysis

CVE-2025-40571 identifies a privilege assignment vulnerability (CWE-266) in Siemens Mendix OIDC SSO modules compatible with Mendix 9 and 10 versions. The vulnerability arises because the module grants read and write access to all tokens exclusively to the Administrator role, which is intended for secure token management. However, this privilege assignment is flawed in versions prior to 4.1.0 (Mendix 10 compatible), 4.0.1 (Mendix 10.12 compatible), and 3.3.0 (Mendix 9 compatible). During Mendix application development, an adversary with administrative access could exploit this misconfiguration to modify the OIDC SSO module, potentially leading to privilege misuse such as unauthorized token manipulation. The vulnerability does not affect confidentiality, integrity, or availability significantly beyond the scope of administrative users, and no user interaction is required. The CVSS 3.1 score is 2.2, reflecting low severity due to the requirement of high privileges and the complexity of exploitation. No public exploits have been reported, and Siemens has published the vulnerability with no direct patch links available yet, indicating that fixed versions are expected or released. This vulnerability highlights the importance of correct privilege assignment in identity and access management modules, especially those handling OIDC tokens in enterprise applications.

Potential Impact

For European organizations, the impact of CVE-2025-40571 is primarily limited to environments where Mendix OIDC SSO modules are used in development or production and where administrative privileges might be compromised or misused. Since the vulnerability requires administrative privileges to exploit, the risk is mainly insider threats or attackers who have already gained high-level access. Potential impacts include unauthorized modification of token handling, which could lead to privilege escalation or unauthorized access to protected resources within Mendix applications. However, the vulnerability does not directly compromise confidentiality, integrity, or availability for general users or external attackers without admin access. Organizations relying on Mendix for critical business applications should be cautious, as misuse during development could introduce security weaknesses or backdoors. The low CVSS score and absence of known exploits suggest limited immediate risk, but the vulnerability underscores the need for strict access controls and monitoring of administrative actions in Mendix environments.

Mitigation Recommendations

1. Upgrade affected Mendix OIDC SSO modules to the latest fixed versions: V4.1.0 or later for Mendix 10 compatible, V4.0.1 or later for Mendix 10.12 compatible, and V3.3.0 or later for Mendix 9 compatible. 2. Restrict administrative privileges strictly to trusted personnel and enforce the principle of least privilege during Mendix development and deployment. 3. Implement robust auditing and monitoring of administrative actions within Mendix environments to detect unauthorized modifications to OIDC SSO modules or token handling processes. 4. Use role-based access control (RBAC) to segregate duties and minimize the number of users with full token read/write access. 5. Conduct regular security reviews and code audits of Mendix applications and modules, especially those handling authentication and token management. 6. Employ multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. 7. Isolate development environments from production to limit the impact of any potential misuse during development phases. 8. Stay informed on Siemens Mendix security advisories for any patches or updates related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2025-04-16T08:20:17.031Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9815c4522896dcbd5edf

Added to database: 5/21/2025, 9:08:37 AM

Last enriched: 11/11/2025, 9:15:33 PM

Last updated: 11/21/2025, 8:45:39 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats