CVE-2025-55797: n/a
An improper access control vulnerability in FormCms v0.5.4 in the /api/schemas/history/[schemaId] endpoint allows unauthenticated attackers to access historical schema data if a valid schemaId is known or guessed.
AI Analysis
Technical Summary
CVE-2025-55797 is a security vulnerability identified in FormCms version 0.5.4, specifically within the API endpoint /api/schemas/history/[schemaId]. This endpoint exposes historical schema data without enforcing proper access control, allowing unauthenticated attackers to access sensitive historical schema information if they can provide or guess a valid schemaId. The vulnerability is classified under CWE-284 (Improper Access Control), indicating that the system fails to restrict access to resources appropriately. The CVSS v3.1 base score is 6.5, reflecting a medium severity level due to the vulnerability's network accessibility (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact primarily affects confidentiality (C:L), with no direct impact on integrity or availability. The scope remains unchanged (S:U), meaning the vulnerability affects resources within the same security scope. No patches or fixes are currently linked, and no known exploits have been reported in the wild. This vulnerability could allow attackers to gather historical schema data, potentially exposing sensitive or proprietary information about form structures and their evolution over time, which could aid in further attacks or data leakage.
Potential Impact
For European organizations, the primary impact of this vulnerability lies in the unauthorized disclosure of historical schema data, which may contain sensitive design or configuration details of forms used in various business processes. This exposure could lead to information leakage, aiding attackers in crafting more targeted attacks or understanding internal workflows. Although the vulnerability does not directly compromise data integrity or availability, the confidentiality breach could have regulatory implications under GDPR if personal data or sensitive business information is indirectly exposed. Organizations relying on FormCms for critical form management, especially in sectors like finance, healthcare, or government, may face increased risk. The lack of authentication requirement and ease of exploitation increase the threat level, particularly for publicly accessible FormCms instances. However, the absence of known exploits in the wild suggests limited immediate risk but highlights the need for proactive mitigation.
Mitigation Recommendations
To mitigate CVE-2025-55797, organizations should implement strict access control mechanisms on the /api/schemas/history/[schemaId] endpoint. This includes enforcing authentication and authorization checks to ensure only authorized users can access historical schema data. If possible, restrict access to this endpoint to internal networks or trusted IP ranges. Employ rate limiting and monitoring to detect and block suspicious access patterns that may indicate schemaId enumeration attempts. Review and sanitize schemaId generation to make guessing difficult, such as using non-sequential, cryptographically random identifiers. Regularly audit API endpoints for similar improper access control issues. Since no official patches are currently available, consider deploying web application firewalls (WAFs) with custom rules to block unauthorized access attempts. Additionally, ensure that logging and alerting are configured to capture any unauthorized access attempts for timely incident response.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-55797: n/a
Description
An improper access control vulnerability in FormCms v0.5.4 in the /api/schemas/history/[schemaId] endpoint allows unauthenticated attackers to access historical schema data if a valid schemaId is known or guessed.
AI-Powered Analysis
Technical Analysis
CVE-2025-55797 is a security vulnerability identified in FormCms version 0.5.4, specifically within the API endpoint /api/schemas/history/[schemaId]. This endpoint exposes historical schema data without enforcing proper access control, allowing unauthenticated attackers to access sensitive historical schema information if they can provide or guess a valid schemaId. The vulnerability is classified under CWE-284 (Improper Access Control), indicating that the system fails to restrict access to resources appropriately. The CVSS v3.1 base score is 6.5, reflecting a medium severity level due to the vulnerability's network accessibility (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact primarily affects confidentiality (C:L), with no direct impact on integrity or availability. The scope remains unchanged (S:U), meaning the vulnerability affects resources within the same security scope. No patches or fixes are currently linked, and no known exploits have been reported in the wild. This vulnerability could allow attackers to gather historical schema data, potentially exposing sensitive or proprietary information about form structures and their evolution over time, which could aid in further attacks or data leakage.
Potential Impact
For European organizations, the primary impact of this vulnerability lies in the unauthorized disclosure of historical schema data, which may contain sensitive design or configuration details of forms used in various business processes. This exposure could lead to information leakage, aiding attackers in crafting more targeted attacks or understanding internal workflows. Although the vulnerability does not directly compromise data integrity or availability, the confidentiality breach could have regulatory implications under GDPR if personal data or sensitive business information is indirectly exposed. Organizations relying on FormCms for critical form management, especially in sectors like finance, healthcare, or government, may face increased risk. The lack of authentication requirement and ease of exploitation increase the threat level, particularly for publicly accessible FormCms instances. However, the absence of known exploits in the wild suggests limited immediate risk but highlights the need for proactive mitigation.
Mitigation Recommendations
To mitigate CVE-2025-55797, organizations should implement strict access control mechanisms on the /api/schemas/history/[schemaId] endpoint. This includes enforcing authentication and authorization checks to ensure only authorized users can access historical schema data. If possible, restrict access to this endpoint to internal networks or trusted IP ranges. Employ rate limiting and monitoring to detect and block suspicious access patterns that may indicate schemaId enumeration attempts. Review and sanitize schemaId generation to make guessing difficult, such as using non-sequential, cryptographically random identifiers. Regularly audit API endpoints for similar improper access control issues. Since no official patches are currently available, consider deploying web application firewalls (WAFs) with custom rules to block unauthorized access attempts. Additionally, ensure that logging and alerting are configured to capture any unauthorized access attempts for timely incident response.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68dbfe6f055163c02d473839
Added to database: 9/30/2025, 3:59:43 PM
Last enriched: 10/8/2025, 4:52:58 AM
Last updated: 11/17/2025, 9:20:47 AM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13272: SQL Injection in Campcodes School Fees Payment Management System
MediumCVE-2025-13271: SQL Injection in Campcodes School Fees Payment Management System
MediumCVE-2025-13270: SQL Injection in Campcodes School Fees Payment Management System
MediumCVE-2025-65073: CWE-863 Incorrect Authorization in OpenStack Keystone
HighCVE-2025-13269: SQL Injection in Campcodes School Fees Payment Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.