CVE-2025-47450: CWE-862 Missing Authorization in Mitchell Bennis Simple File List
Missing Authorization vulnerability in Mitchell Bennis Simple File List allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Simple File List: from n/a through 6.1.13.
AI Analysis
Technical Summary
CVE-2025-47450 is a security vulnerability classified under CWE-862 (Missing Authorization) affecting the Simple File List product developed by Mitchell Bennis. The vulnerability arises due to incorrectly configured access control security levels, which results in missing authorization checks. This means that unauthorized users can perform actions or access resources that should be restricted. The affected product versions include all versions up to 6.1.13, although the exact range is not fully specified. The vulnerability has a CVSS 3.1 base score of 5.3, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) reveals that the vulnerability can be exploited remotely over the network without any privileges or user interaction. The impact is limited to integrity, with no direct confidentiality or availability impact. Specifically, unauthorized users can modify or manipulate data within the Simple File List application, potentially leading to data tampering or unauthorized file modifications. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting that mitigation may require vendor updates or configuration changes once available. The vulnerability is significant because Simple File List is a file management tool often used to share and manage files on web servers, and missing authorization can expose sensitive files or allow unauthorized file operations.
Potential Impact
For European organizations using Simple File List, this vulnerability poses a risk of unauthorized data modification, which could compromise the integrity of shared files or documents. This may affect sectors relying on secure file sharing such as legal, financial, healthcare, and government institutions. While confidentiality and availability are not directly impacted, data integrity issues can lead to misinformation, compliance violations (e.g., GDPR if personal data is altered), and operational disruptions. Attackers exploiting this vulnerability remotely without authentication increase the risk of widespread exploitation, especially if the application is publicly accessible. The absence of user interaction and privileges required for exploitation further heightens the threat. Organizations may face reputational damage and potential regulatory penalties if unauthorized changes lead to data breaches or non-compliance with data protection laws.
Mitigation Recommendations
European organizations should immediately audit their Simple File List deployments to identify if they are running vulnerable versions (up to 6.1.13). Until a vendor patch is released, organizations should implement strict network-level access controls such as IP whitelisting or VPN-only access to the file list interface to limit exposure. Web application firewalls (WAFs) can be configured to detect and block suspicious requests targeting file list operations. Additionally, review and tighten file permissions and access control configurations within the application to ensure that unauthorized users cannot perform sensitive actions. Monitoring and logging access to the Simple File List should be enhanced to detect anomalous activities indicative of exploitation attempts. Organizations should subscribe to vendor advisories and apply patches promptly once available. If feasible, consider temporary replacement with alternative secure file sharing solutions until the vulnerability is resolved.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-47450: CWE-862 Missing Authorization in Mitchell Bennis Simple File List
Description
Missing Authorization vulnerability in Mitchell Bennis Simple File List allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Simple File List: from n/a through 6.1.13.
AI-Powered Analysis
Technical Analysis
CVE-2025-47450 is a security vulnerability classified under CWE-862 (Missing Authorization) affecting the Simple File List product developed by Mitchell Bennis. The vulnerability arises due to incorrectly configured access control security levels, which results in missing authorization checks. This means that unauthorized users can perform actions or access resources that should be restricted. The affected product versions include all versions up to 6.1.13, although the exact range is not fully specified. The vulnerability has a CVSS 3.1 base score of 5.3, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) reveals that the vulnerability can be exploited remotely over the network without any privileges or user interaction. The impact is limited to integrity, with no direct confidentiality or availability impact. Specifically, unauthorized users can modify or manipulate data within the Simple File List application, potentially leading to data tampering or unauthorized file modifications. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting that mitigation may require vendor updates or configuration changes once available. The vulnerability is significant because Simple File List is a file management tool often used to share and manage files on web servers, and missing authorization can expose sensitive files or allow unauthorized file operations.
Potential Impact
For European organizations using Simple File List, this vulnerability poses a risk of unauthorized data modification, which could compromise the integrity of shared files or documents. This may affect sectors relying on secure file sharing such as legal, financial, healthcare, and government institutions. While confidentiality and availability are not directly impacted, data integrity issues can lead to misinformation, compliance violations (e.g., GDPR if personal data is altered), and operational disruptions. Attackers exploiting this vulnerability remotely without authentication increase the risk of widespread exploitation, especially if the application is publicly accessible. The absence of user interaction and privileges required for exploitation further heightens the threat. Organizations may face reputational damage and potential regulatory penalties if unauthorized changes lead to data breaches or non-compliance with data protection laws.
Mitigation Recommendations
European organizations should immediately audit their Simple File List deployments to identify if they are running vulnerable versions (up to 6.1.13). Until a vendor patch is released, organizations should implement strict network-level access controls such as IP whitelisting or VPN-only access to the file list interface to limit exposure. Web application firewalls (WAFs) can be configured to detect and block suspicious requests targeting file list operations. Additionally, review and tighten file permissions and access control configurations within the application to ensure that unauthorized users cannot perform sensitive actions. Monitoring and logging access to the Simple File List should be enhanced to detect anomalous activities indicative of exploitation attempts. Organizations should subscribe to vendor advisories and apply patches promptly once available. If feasible, consider temporary replacement with alternative secure file sharing solutions until the vulnerability is resolved.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-07T09:38:40.259Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ac4522896dcbd9478
Added to database: 5/21/2025, 9:08:42 AM
Last enriched: 7/5/2025, 12:12:34 PM
Last updated: 8/2/2025, 10:00:47 AM
Views: 12
Related Threats
CVE-2025-8981: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-50862: n/a
UnknownCVE-2025-50861: n/a
UnknownCVE-2025-8978: Insufficient Verification of Data Authenticity in D-Link DIR-619L
HighCVE-2025-8946: SQL Injection in projectworlds Online Notes Sharing Platform
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.