Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49145: CWE-863: Incorrect Authorization in Combodo iTop

0
High
VulnerabilityCVE-2025-49145cvecve-2025-49145cwe-863
Published: Mon Nov 10 2025 (11/10/2025, 21:10:19 UTC)
Source: CVE Database V5
Vendor/Project: Combodo
Product: iTop

Description

Combodo iTop is a web based IT service management tool. In versions prior to 2.7.13 and 3.2.2, a user that has enough rights to create webhooks (mostly administrators) can drop the database. This is fixed in iTop 2.7.13 and 3.2.2 by verifying callback signature.

AI-Powered Analysis

AILast updated: 11/10/2025, 21:34:34 UTC

Technical Analysis

CVE-2025-49145 is an incorrect authorization vulnerability (CWE-863) affecting Combodo iTop, a widely used web-based IT service management platform. The flaw exists in versions prior to 2.7.13 and from 3.0.0-alpha up to but not including 3.2.2. Users with sufficient privileges to create webhooks—primarily administrators—can exploit this vulnerability to execute destructive operations, specifically dropping the backend database. The root cause is the lack of proper verification of webhook callback signatures, allowing attackers to craft malicious webhook requests that bypass authorization controls. This leads to a critical impact on data integrity and availability, as the database can be completely deleted. The vulnerability has a CVSS v3.1 score of 8.7, indicating high severity, with an attack vector over the network, low attack complexity, required privileges at a high level, no user interaction, and scope change. The fix implemented in versions 2.7.13 and 3.2.2 involves verifying the authenticity of webhook callbacks via signature validation, preventing unauthorized destructive commands. Although no known exploits are reported in the wild yet, the potential damage and ease of exploitation by privileged users make this a significant threat. Organizations relying on iTop for ITSM should prioritize upgrading to patched versions to prevent data loss and service disruption.

Potential Impact

For European organizations, the impact of CVE-2025-49145 can be severe. iTop is often used to manage IT services, assets, and workflows; a successful exploit can result in the deletion of critical databases, causing loss of service management data, disruption of IT operations, and potential downtime. This can affect incident response, change management, and asset tracking, leading to operational inefficiencies and increased recovery costs. Additionally, loss of data integrity and availability can impact compliance with European data protection regulations such as GDPR, especially if personal or sensitive data is managed within iTop. The disruption could also affect sectors reliant on ITSM for critical infrastructure, including healthcare, finance, and government agencies. Recovery from database loss may require extensive restoration efforts and could expose organizations to reputational damage. Given that exploitation requires administrative privileges, insider threats or compromised administrator accounts pose a significant risk vector. The vulnerability’s network accessibility further increases the risk of remote exploitation if administrative credentials are compromised.

Mitigation Recommendations

To mitigate CVE-2025-49145, European organizations should immediately upgrade Combodo iTop to versions 2.7.13 or 3.2.2 or later, where the vulnerability is patched by enforcing webhook callback signature verification. Until upgrades are applied, restrict webhook creation permissions strictly to trusted administrators and monitor webhook configurations for suspicious activity. Implement strong access controls and multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. Regularly audit webhook usage and logs to detect unauthorized or anomalous webhook calls. Network segmentation and firewall rules should limit access to the iTop management interface to trusted IP addresses. Backup iTop databases frequently and verify backup integrity to ensure rapid recovery in case of data loss. Additionally, consider deploying web application firewalls (WAFs) with custom rules to detect and block malformed webhook requests. Educate administrators about the risks of this vulnerability and the importance of secure webhook management. Finally, maintain up-to-date vulnerability scanning and monitoring to detect any attempts to exploit this or similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-06-02T10:39:41.635Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6912576658b9e66d50002ec7

Added to database: 11/10/2025, 9:21:42 PM

Last enriched: 11/10/2025, 9:34:34 PM

Last updated: 11/11/2025, 12:07:43 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats