CVE-2025-49145: CWE-863: Incorrect Authorization in Combodo iTop
Combodo iTop is a web based IT service management tool. In versions prior to 2.7.13 and 3.2.2, a user that has enough rights to create webhooks (mostly administrators) can drop the database. This is fixed in iTop 2.7.13 and 3.2.2 by verifying callback signature.
AI Analysis
Technical Summary
CVE-2025-49145 is an incorrect authorization vulnerability (CWE-863) affecting Combodo iTop, a widely used web-based IT service management platform. The flaw exists in versions prior to 2.7.13 and from 3.0.0-alpha up to but not including 3.2.2. Users with sufficient privileges to create webhooks—primarily administrators—can exploit this vulnerability to execute destructive operations, specifically dropping the backend database. The root cause is the lack of proper verification of webhook callback signatures, allowing attackers to craft malicious webhook requests that bypass authorization controls. This leads to a critical impact on data integrity and availability, as the database can be completely deleted. The vulnerability has a CVSS v3.1 score of 8.7, indicating high severity, with an attack vector over the network, low attack complexity, required privileges at a high level, no user interaction, and scope change. The fix implemented in versions 2.7.13 and 3.2.2 involves verifying the authenticity of webhook callbacks via signature validation, preventing unauthorized destructive commands. Although no known exploits are reported in the wild yet, the potential damage and ease of exploitation by privileged users make this a significant threat. Organizations relying on iTop for ITSM should prioritize upgrading to patched versions to prevent data loss and service disruption.
Potential Impact
For European organizations, the impact of CVE-2025-49145 can be severe. iTop is often used to manage IT services, assets, and workflows; a successful exploit can result in the deletion of critical databases, causing loss of service management data, disruption of IT operations, and potential downtime. This can affect incident response, change management, and asset tracking, leading to operational inefficiencies and increased recovery costs. Additionally, loss of data integrity and availability can impact compliance with European data protection regulations such as GDPR, especially if personal or sensitive data is managed within iTop. The disruption could also affect sectors reliant on ITSM for critical infrastructure, including healthcare, finance, and government agencies. Recovery from database loss may require extensive restoration efforts and could expose organizations to reputational damage. Given that exploitation requires administrative privileges, insider threats or compromised administrator accounts pose a significant risk vector. The vulnerability’s network accessibility further increases the risk of remote exploitation if administrative credentials are compromised.
Mitigation Recommendations
To mitigate CVE-2025-49145, European organizations should immediately upgrade Combodo iTop to versions 2.7.13 or 3.2.2 or later, where the vulnerability is patched by enforcing webhook callback signature verification. Until upgrades are applied, restrict webhook creation permissions strictly to trusted administrators and monitor webhook configurations for suspicious activity. Implement strong access controls and multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. Regularly audit webhook usage and logs to detect unauthorized or anomalous webhook calls. Network segmentation and firewall rules should limit access to the iTop management interface to trusted IP addresses. Backup iTop databases frequently and verify backup integrity to ensure rapid recovery in case of data loss. Additionally, consider deploying web application firewalls (WAFs) with custom rules to detect and block malformed webhook requests. Educate administrators about the risks of this vulnerability and the importance of secure webhook management. Finally, maintain up-to-date vulnerability scanning and monitoring to detect any attempts to exploit this or similar vulnerabilities.
Affected Countries
France, Germany, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-49145: CWE-863: Incorrect Authorization in Combodo iTop
Description
Combodo iTop is a web based IT service management tool. In versions prior to 2.7.13 and 3.2.2, a user that has enough rights to create webhooks (mostly administrators) can drop the database. This is fixed in iTop 2.7.13 and 3.2.2 by verifying callback signature.
AI-Powered Analysis
Technical Analysis
CVE-2025-49145 is an incorrect authorization vulnerability (CWE-863) affecting Combodo iTop, a widely used web-based IT service management platform. The flaw exists in versions prior to 2.7.13 and from 3.0.0-alpha up to but not including 3.2.2. Users with sufficient privileges to create webhooks—primarily administrators—can exploit this vulnerability to execute destructive operations, specifically dropping the backend database. The root cause is the lack of proper verification of webhook callback signatures, allowing attackers to craft malicious webhook requests that bypass authorization controls. This leads to a critical impact on data integrity and availability, as the database can be completely deleted. The vulnerability has a CVSS v3.1 score of 8.7, indicating high severity, with an attack vector over the network, low attack complexity, required privileges at a high level, no user interaction, and scope change. The fix implemented in versions 2.7.13 and 3.2.2 involves verifying the authenticity of webhook callbacks via signature validation, preventing unauthorized destructive commands. Although no known exploits are reported in the wild yet, the potential damage and ease of exploitation by privileged users make this a significant threat. Organizations relying on iTop for ITSM should prioritize upgrading to patched versions to prevent data loss and service disruption.
Potential Impact
For European organizations, the impact of CVE-2025-49145 can be severe. iTop is often used to manage IT services, assets, and workflows; a successful exploit can result in the deletion of critical databases, causing loss of service management data, disruption of IT operations, and potential downtime. This can affect incident response, change management, and asset tracking, leading to operational inefficiencies and increased recovery costs. Additionally, loss of data integrity and availability can impact compliance with European data protection regulations such as GDPR, especially if personal or sensitive data is managed within iTop. The disruption could also affect sectors reliant on ITSM for critical infrastructure, including healthcare, finance, and government agencies. Recovery from database loss may require extensive restoration efforts and could expose organizations to reputational damage. Given that exploitation requires administrative privileges, insider threats or compromised administrator accounts pose a significant risk vector. The vulnerability’s network accessibility further increases the risk of remote exploitation if administrative credentials are compromised.
Mitigation Recommendations
To mitigate CVE-2025-49145, European organizations should immediately upgrade Combodo iTop to versions 2.7.13 or 3.2.2 or later, where the vulnerability is patched by enforcing webhook callback signature verification. Until upgrades are applied, restrict webhook creation permissions strictly to trusted administrators and monitor webhook configurations for suspicious activity. Implement strong access controls and multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. Regularly audit webhook usage and logs to detect unauthorized or anomalous webhook calls. Network segmentation and firewall rules should limit access to the iTop management interface to trusted IP addresses. Backup iTop databases frequently and verify backup integrity to ensure rapid recovery in case of data loss. Additionally, consider deploying web application firewalls (WAFs) with custom rules to detect and block malformed webhook requests. Educate administrators about the risks of this vulnerability and the importance of secure webhook management. Finally, maintain up-to-date vulnerability scanning and monitoring to detect any attempts to exploit this or similar vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-06-02T10:39:41.635Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6912576658b9e66d50002ec7
Added to database: 11/10/2025, 9:21:42 PM
Last enriched: 11/10/2025, 9:34:34 PM
Last updated: 11/11/2025, 12:07:43 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-63678: n/a
UnknownCVE-2025-11892: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in GitHub Enterprise Server
HighCVE-2025-11578: CWE-59 Improper Link Resolution Before File Access ('Link Following') in GitHub Enterprise Server
HighCVE-2025-64529: CWE-770: Allocation of Resources Without Limits or Throttling in authzed spicedb
LowCVE-2025-64522: CWE-918: Server-Side Request Forgery (SSRF) in charmbracelet soft-serve
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.