CVE-2025-43712: n/a
JHipster before v.8.9.0 allows privilege escalation via a modified authorities parameter. Upon registering in the JHipster portal and logging in as a standard user, the authorities parameter in the response from the api/account endpoint contains the value ROLE_USER. By manipulating the authorities parameter and changing its value to ROLE_ADMIN, the privilege is successfully escalated to an Admin level. This allowed the access to all admin-related functionalities in the application.
CVE-2025-43712: n/a
Description
JHipster before v.8.9.0 allows privilege escalation via a modified authorities parameter. Upon registering in the JHipster portal and logging in as a standard user, the authorities parameter in the response from the api/account endpoint contains the value ROLE_USER. By manipulating the authorities parameter and changing its value to ROLE_ADMIN, the privilege is successfully escalated to an Admin level. This allowed the access to all admin-related functionalities in the application.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-17T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6883877ead5a09ad00505e67
Added to database: 7/25/2025, 1:32:46 PM
Last updated: 7/25/2025, 1:32:46 PM
Views: 1
Related Threats
CVE-2025-8156: SQL Injection in PHPGurukul User Registration & Login and User Management
MediumCVE-2025-8155: Cross Site Scripting in D-Link DCS-6010L
MediumHow we Rooted Copilot
HighCVE-2025-5254: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Kron Technologies Kron PAM
MediumCVE-2025-5253: CWE-770 Allocation of Resources Without Limits or Throttling in Kron Technologies Kron PAM
MediumActions
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.