Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48878: CWE-862: Missing Authorization in Combodo iTop

0
Medium
VulnerabilityCVE-2025-48878cvecve-2025-48878cwe-862
Published: Mon Nov 10 2025 (11/10/2025, 20:43:04 UTC)
Source: CVE Database V5
Vendor/Project: Combodo
Product: iTop

Description

Combodo iTop is a web based IT service management tool. In versions on the 3.x branch prior to 3.2.2, an insecure direct object reference allows a user (e.g. with Service desk agent profile) to create a ModuleInstallation object when they shouldn't be able to do so. Version 3.2.2 fixes the issue.

AI-Powered Analysis

AILast updated: 11/10/2025, 21:06:59 UTC

Technical Analysis

CVE-2025-48878 is a vulnerability classified under CWE-862 (Missing Authorization) affecting Combodo iTop, a web-based IT service management (ITSM) tool widely used for managing IT services and assets. The flaw exists in versions from 3.0.0-alpha up to 3.2.2, where an insecure direct object reference (IDOR) allows users assigned the Service desk agent profile to create ModuleInstallation objects without proper authorization checks. ModuleInstallation objects typically represent the installation of modules or extensions within iTop, and unauthorized creation could allow an attacker to alter the system's configuration or introduce unauthorized modules. The vulnerability does not require user interaction and can be exploited remotely over the network with low privileges (service desk agent level). The CVSS v3.1 base score is 4.3 (medium), reflecting limited impact on confidentiality and availability but a potential integrity impact. The flaw is fixed in version 3.2.2, and no public exploits or active exploitation have been reported to date. The vulnerability stems from missing authorization logic in the application code, allowing privilege escalation within the scope of the service desk agent role. This could lead to unauthorized changes in the ITSM environment, potentially undermining trust in service management processes and configurations.

Potential Impact

For European organizations, this vulnerability poses a risk to the integrity of IT service management processes. Unauthorized creation of ModuleInstallation objects could allow attackers or malicious insiders to alter system configurations, potentially leading to mismanagement of IT assets or introduction of unauthorized modules that could be leveraged for further attacks. While confidentiality and availability are not directly impacted, the integrity compromise could disrupt IT operations and compliance with regulatory frameworks such as GDPR or ISO 27001, which require strict control over IT management systems. Organizations relying on Combodo iTop for critical ITSM functions may face operational risks and potential compliance issues if this vulnerability is exploited. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially in environments with less stringent internal controls or where service desk agents have broad access.

Mitigation Recommendations

European organizations should upgrade all affected Combodo iTop instances to version 3.2.2 or later, where the authorization flaw is fixed. Until patching is possible, restrict the assignment of the Service desk agent profile to trusted personnel only and review role permissions to minimize unnecessary privileges. Implement application-layer access controls and monitor logs for unusual creation of ModuleInstallation objects. Conduct regular audits of ITSM configurations to detect unauthorized changes. Network segmentation and limiting access to the iTop web interface to trusted networks can reduce exposure. Additionally, organizations should consider implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting ModuleInstallation creation endpoints. Finally, maintain an incident response plan that includes procedures for ITSM compromise scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-05-27T20:14:34.296Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6912505b58b9e66d50f7c9cc

Added to database: 11/10/2025, 8:51:39 PM

Last enriched: 11/10/2025, 9:06:59 PM

Last updated: 11/11/2025, 3:12:42 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats