Skip to main content

CVE-2025-47450: CWE-862 Missing Authorization in Mitchell Bennis Simple File List

Medium
VulnerabilityCVE-2025-47450cvecve-2025-47450cwe-862
Published: Wed May 07 2025 (05/07/2025, 14:19:35 UTC)
Source: CVE
Vendor/Project: Mitchell Bennis
Product: Simple File List

Description

Missing Authorization vulnerability in Mitchell Bennis Simple File List allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Simple File List: from n/a through 6.1.13.

AI-Powered Analysis

AILast updated: 07/05/2025, 12:12:34 UTC

Technical Analysis

CVE-2025-47450 is a security vulnerability classified under CWE-862 (Missing Authorization) affecting the Simple File List product developed by Mitchell Bennis. The vulnerability arises due to incorrectly configured access control security levels, which results in missing authorization checks. This means that unauthorized users can perform actions or access resources that should be restricted. The affected product versions include all versions up to 6.1.13, although the exact range is not fully specified. The vulnerability has a CVSS 3.1 base score of 5.3, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) reveals that the vulnerability can be exploited remotely over the network without any privileges or user interaction. The impact is limited to integrity, with no direct confidentiality or availability impact. Specifically, unauthorized users can modify or manipulate data within the Simple File List application, potentially leading to data tampering or unauthorized file modifications. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting that mitigation may require vendor updates or configuration changes once available. The vulnerability is significant because Simple File List is a file management tool often used to share and manage files on web servers, and missing authorization can expose sensitive files or allow unauthorized file operations.

Potential Impact

For European organizations using Simple File List, this vulnerability poses a risk of unauthorized data modification, which could compromise the integrity of shared files or documents. This may affect sectors relying on secure file sharing such as legal, financial, healthcare, and government institutions. While confidentiality and availability are not directly impacted, data integrity issues can lead to misinformation, compliance violations (e.g., GDPR if personal data is altered), and operational disruptions. Attackers exploiting this vulnerability remotely without authentication increase the risk of widespread exploitation, especially if the application is publicly accessible. The absence of user interaction and privileges required for exploitation further heightens the threat. Organizations may face reputational damage and potential regulatory penalties if unauthorized changes lead to data breaches or non-compliance with data protection laws.

Mitigation Recommendations

European organizations should immediately audit their Simple File List deployments to identify if they are running vulnerable versions (up to 6.1.13). Until a vendor patch is released, organizations should implement strict network-level access controls such as IP whitelisting or VPN-only access to the file list interface to limit exposure. Web application firewalls (WAFs) can be configured to detect and block suspicious requests targeting file list operations. Additionally, review and tighten file permissions and access control configurations within the application to ensure that unauthorized users cannot perform sensitive actions. Monitoring and logging access to the Simple File List should be enhanced to detect anomalous activities indicative of exploitation attempts. Organizations should subscribe to vendor advisories and apply patches promptly once available. If feasible, consider temporary replacement with alternative secure file sharing solutions until the vulnerability is resolved.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-07T09:38:40.259Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ac4522896dcbd9478

Added to database: 5/21/2025, 9:08:42 AM

Last enriched: 7/5/2025, 12:12:34 PM

Last updated: 8/2/2025, 10:00:47 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats