Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57975: CWE-862 Missing Authorization in RadiusTheme Team

0
Medium
VulnerabilityCVE-2025-57975cvecve-2025-57975cwe-862
Published: Mon Sep 22 2025 (09/22/2025, 18:24:33 UTC)
Source: CVE Database V5
Vendor/Project: RadiusTheme
Product: Team

Description

Missing Authorization vulnerability in RadiusTheme Team allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Team: from n/a through 5.0.6.

AI-Powered Analysis

AILast updated: 09/30/2025, 00:34:30 UTC

Technical Analysis

CVE-2025-57975 is a Missing Authorization vulnerability (CWE-862) identified in the RadiusTheme Team product, affecting versions up to 5.0.6. This vulnerability arises from improperly configured access control mechanisms within the software, allowing users with limited privileges (requiring low-level privileges, PR:L) to perform actions or access resources that should be restricted. The vulnerability does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The scope of the vulnerability is unchanged (S:U), meaning the impact is confined to the vulnerable component without affecting other components or systems. The confidentiality impact is limited (C:L), indicating some information disclosure risk, but there is no impact on integrity (I:N) or availability (A:N). The CVSS v3.1 base score is 4.3, categorizing it as a medium severity issue. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability could allow an attacker with some level of authenticated access to bypass authorization checks, potentially exposing sensitive information or functionality that should be restricted, which could lead to further exploitation or data leakage depending on the context of the application and data handled by RadiusTheme Team.

Potential Impact

For European organizations using RadiusTheme Team, this vulnerability could lead to unauthorized access to sensitive information or restricted functionalities within the application. Although the confidentiality impact is limited and there is no direct impact on integrity or availability, unauthorized access could facilitate reconnaissance or lateral movement within an organization's environment. Organizations in sectors such as media, publishing, or any industry relying on RadiusTheme Team for content management or collaboration could face risks of data exposure or unauthorized data manipulation. The medium severity score suggests that while the immediate risk is not critical, it should not be ignored, especially in environments where sensitive or regulated data is handled. Exploitation could undermine trust in internal systems and potentially lead to compliance issues under regulations like GDPR if personal data is exposed.

Mitigation Recommendations

Organizations should implement strict access control policies and review user privilege assignments within RadiusTheme Team to ensure that users have only the minimum necessary permissions. Until an official patch is released, administrators should monitor for unusual access patterns or privilege escalations. Network segmentation and limiting access to the RadiusTheme Team application to trusted users and networks can reduce exposure. Additionally, enabling detailed logging and auditing of user actions can help detect potential exploitation attempts. If possible, applying compensating controls such as web application firewalls (WAF) with custom rules to restrict unauthorized access attempts may help mitigate risk. Organizations should stay alert for vendor updates or patches addressing this vulnerability and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-08-22T11:37:13.319Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d194c8a6a0abbafb7a3a17

Added to database: 9/22/2025, 6:26:16 PM

Last enriched: 9/30/2025, 12:34:30 AM

Last updated: 10/7/2025, 1:41:09 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats