Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57936: CWE-862 Missing Authorization in Meitar Subresource Integrity (SRI) Manager

0
Medium
VulnerabilityCVE-2025-57936cvecve-2025-57936cwe-862
Published: Mon Sep 22 2025 (09/22/2025, 18:25:01 UTC)
Source: CVE Database V5
Vendor/Project: Meitar
Product: Subresource Integrity (SRI) Manager

Description

Missing Authorization vulnerability in Meitar Subresource Integrity (SRI) Manager allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Subresource Integrity (SRI) Manager: from n/a through 0.4.0.

AI-Powered Analysis

AILast updated: 09/30/2025, 00:56:32 UTC

Technical Analysis

CVE-2025-57936 is a security vulnerability classified under CWE-862 (Missing Authorization) affecting the Meitar Subresource Integrity (SRI) Manager up to version 0.4.0. The vulnerability arises due to improperly configured access control mechanisms within the SRI Manager, allowing unauthorized users with limited privileges (PR:L - Privileges Required: Low) to exploit missing authorization checks. This flaw does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N). The vulnerability impacts the integrity of the system (I:L) but does not affect confidentiality or availability. Subresource Integrity (SRI) is a security feature used in web applications to ensure that externally loaded resources (such as scripts or stylesheets) have not been tampered with. The Meitar SRI Manager is presumably a tool or service that manages these integrity checks. Missing authorization means that users with some level of access can perform actions or access functionality that should be restricted, potentially allowing them to manipulate or bypass integrity checks or configurations. Although the CVSS score is moderate (4.3), the vulnerability could enable attackers to weaken the security guarantees provided by SRI, potentially leading to the injection or execution of unauthorized or malicious resources within web applications relying on this manager. No known exploits are currently reported in the wild, and no patches have been published yet, indicating that organizations using this product should proactively monitor for updates and consider compensating controls. The vulnerability's scope is limited to integrity impact without affecting confidentiality or availability, and it requires low-level privileges, which suggests that attackers need some authenticated access but not administrative rights.

Potential Impact

For European organizations, the impact of CVE-2025-57936 could be significant in environments where the Meitar SRI Manager is deployed to enforce web resource integrity. Compromise of integrity controls may allow attackers to inject malicious scripts or resources into web applications, potentially leading to further exploitation such as cross-site scripting (XSS), session hijacking, or supply chain attacks. This could undermine user trust, lead to data manipulation, or facilitate broader attacks on web infrastructure. Organizations in sectors with high reliance on web applications—such as finance, e-commerce, government, and critical infrastructure—may face reputational damage, regulatory scrutiny under GDPR for failing to protect data integrity, and operational disruptions. Since the vulnerability requires some level of authenticated access, insider threats or compromised low-privilege accounts could be leveraged to exploit this flaw. The absence of known exploits reduces immediate risk but also means organizations should be vigilant and prioritize remediation once patches become available.

Mitigation Recommendations

1. Implement strict access control policies around the Meitar SRI Manager, ensuring that only trusted and necessary users have low-level privileges that could be exploited. 2. Monitor and audit all access and configuration changes within the SRI Manager to detect unauthorized activities promptly. 3. Employ network segmentation and zero-trust principles to limit exposure of the SRI Manager to only essential systems and users. 4. Until a patch is released, consider disabling or restricting features of the SRI Manager that involve authorization-sensitive operations if feasible. 5. Use web application firewalls (WAFs) to detect and block suspicious requests targeting the SRI Manager interfaces. 6. Maintain up-to-date inventory of affected software versions and subscribe to vendor or security advisories for timely patch deployment. 7. Conduct internal penetration testing focusing on authorization controls around the SRI Manager to identify potential exploitation paths. 8. Educate users with low-level privileges about security best practices and the risks of credential compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-08-22T11:36:33.371Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d194c6a6a0abbafb7a395f

Added to database: 9/22/2025, 6:26:14 PM

Last enriched: 9/30/2025, 12:56:32 AM

Last updated: 10/7/2025, 1:51:46 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats