Skip to main content

CVE-2025-43712: n/a

High
VulnerabilityCVE-2025-43712cvecve-2025-43712
Published: Fri Jul 25 2025 (07/25/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

JHipster before v.8.9.0 allows privilege escalation via a modified authorities parameter. Upon registering in the JHipster portal and logging in as a standard user, the authorities parameter in the response from the api/account endpoint contains the value ROLE_USER. By manipulating the authorities parameter and changing its value to ROLE_ADMIN, the privilege is successfully escalated to an Admin level. This allowed the access to all admin-related functionalities in the application.

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-17T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6883877ead5a09ad00505e67

Added to database: 7/25/2025, 1:32:46 PM

Last updated: 7/25/2025, 1:32:46 PM

Views: 1

Actions

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats