Skip to main content

CVE-2025-48741: CWE-266 Incorrect Privilege Assignment in StrangeBee TheHive

Medium
VulnerabilityCVE-2025-48741cvecve-2025-48741cwe-266
Published: Fri May 23 2025 (05/23/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: StrangeBee
Product: TheHive

Description

A Broken Access Control vulnerability in StrangeBee TheHive 5.2.0 before 5.2.16, 5.3.0 before 5.3.11, and 5.4.0 before 5.4.10 allows remote, authenticated, and unprivileged users to retrieve alerts, cases, logs, observables, or tasks, regardless of the user's permissions, through a specific API endpoint.

AI-Powered Analysis

AILast updated: 07/08/2025, 20:55:47 UTC

Technical Analysis

CVE-2025-48741 is a Broken Access Control vulnerability identified in StrangeBee's TheHive security incident response platform versions 5.2.0 prior to 5.2.16, 5.3.0 prior to 5.3.11, and 5.4.0 prior to 5.4.10. The flaw arises from incorrect privilege assignment (CWE-266), allowing remote attackers who are authenticated but possess only unprivileged user accounts to bypass intended access restrictions. Specifically, these users can access sensitive data such as alerts, cases, logs, observables, or tasks through a particular API endpoint that does not enforce proper permission checks. The vulnerability does not require elevated privileges or administrative access, but does require authentication and some user interaction to exploit. The CVSS 4.0 base score of 6.8 (medium severity) reflects the network attack vector, low attack complexity, no need for privileges beyond a basic user, and high impact on confidentiality due to unauthorized data disclosure. Integrity and availability impacts are not present. No known exploits are currently reported in the wild, and no official patches are linked yet, indicating that organizations using affected versions should prioritize mitigation. TheHive is widely used by security operations centers (SOCs) and incident response teams to manage and analyze security incidents, making the confidentiality of its stored data critical. Unauthorized access to case data or logs could expose sensitive investigation details, potentially undermining incident response efforts and revealing organizational vulnerabilities or threat actor tactics.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive incident response data managed within TheHive platform. Exposure of alerts, cases, and logs could lead to leakage of internal security investigations, threat intelligence, and potentially personally identifiable information (PII) or sensitive business information. This could result in reputational damage, regulatory non-compliance (e.g., GDPR violations), and increased risk of follow-on attacks by adversaries leveraging disclosed intelligence. Given that TheHive is often integrated into broader security ecosystems, unauthorized data access could also facilitate lateral movement or social engineering attacks. The medium severity rating suggests that while the vulnerability does not allow full system compromise or denial of service, the breach of confidentiality alone is impactful for organizations handling sensitive security data. European entities with mature SOCs or those subject to strict data protection regulations must consider this vulnerability a priority to address.

Mitigation Recommendations

1. Immediate mitigation involves upgrading TheHive to the latest patched versions beyond 5.2.16, 5.3.11, or 5.4.10 as soon as they become available from StrangeBee. 2. Until patches are applied, restrict access to TheHive API endpoints by implementing network-level controls such as IP whitelisting, VPN access, or firewall rules limiting API access to trusted internal networks and users. 3. Enforce strict authentication and authorization policies, including multi-factor authentication (MFA) for all users, to reduce risk of compromised credentials being exploited. 4. Conduct thorough audits of user permissions within TheHive to ensure minimal privilege principles are applied and remove unnecessary user accounts. 5. Monitor API access logs for unusual or unauthorized access patterns indicative of exploitation attempts. 6. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious API calls targeting the vulnerable endpoints. 7. Educate SOC and incident response teams about the vulnerability and the importance of reporting any anomalies promptly. 8. Engage with StrangeBee support or community channels to obtain official patches and updates as soon as they are released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-05-23T00:00:00.000Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6830d58c0acd01a2492754fd

Added to database: 5/23/2025, 8:07:40 PM

Last enriched: 7/8/2025, 8:55:47 PM

Last updated: 8/18/2025, 11:33:34 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats