Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58386: n/a

0
Unknown
VulnerabilityCVE-2025-58386cvecve-2025-58386
Published: Tue Dec 02 2025 (12/02/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

In Terminalfour 8 through 8.4.1.1, the userLevel parameter in the user management function is not subject to proper server-side authorization checks. A Power User can intercept and modify this parameter to assign the Administrator role to other existing lower-privileged accounts, or invite a new lower-privileged account and escalate its privileges. While manipulating this request, the Power User can also change the target account's password, effectively taking full control of it.

AI-Powered Analysis

AILast updated: 12/02/2025, 18:27:12 UTC

Technical Analysis

CVE-2025-58386 is a critical privilege escalation vulnerability affecting Terminalfour versions 8 through 8.4.1.1, a web content management system widely used by enterprises and public sector organizations. The vulnerability stems from inadequate server-side authorization checks on the userLevel parameter within the user management functionality. Specifically, a user with Power User privileges can intercept and manipulate this parameter in HTTP requests to escalate privileges improperly. By modifying userLevel, the attacker can assign the Administrator role to existing lower-privileged accounts or newly invited users. Additionally, the attacker can change the password of the targeted account during this process, gaining full control over it. This flaw bypasses intended access controls, allowing privilege escalation without requiring administrator credentials or additional user interaction. The vulnerability was reserved in August 2025 and published in December 2025, with no CVSS score assigned yet and no known public exploits. The lack of proper authorization checks indicates a design flaw in the access control logic of Terminalfour’s user management module. Exploiting this vulnerability could lead to complete compromise of the affected system, enabling attackers to manipulate content, access sensitive data, or disrupt services. The vulnerability affects all deployments running Terminalfour versions 8 through 8.4.1.1, which are commonly found in European government agencies, universities, and large enterprises managing web content and digital assets. The absence of patches at the time of disclosure necessitates immediate risk mitigation through compensating controls and monitoring.

Potential Impact

For European organizations, exploitation of CVE-2025-58386 could have severe consequences. Unauthorized privilege escalation to Administrator level compromises the confidentiality, integrity, and availability of web content managed by Terminalfour. Attackers could alter or delete critical information, inject malicious content, or disrupt website operations, damaging organizational reputation and trust. Sensitive data accessible through the CMS could be exfiltrated, violating data protection regulations such as GDPR. The ability to change passwords and fully control accounts increases the risk of persistent unauthorized access and lateral movement within organizational networks. Public sector entities and educational institutions, which often use Terminalfour for official websites and portals, may face heightened risks of defacement or misinformation campaigns. The disruption of digital services could impact citizen engagement and internal workflows. The lack of known exploits currently provides a window for proactive defense, but the vulnerability’s nature makes it a prime target for attackers once exploit code becomes available.

Mitigation Recommendations

Until official patches are released, European organizations should implement several specific mitigations: 1) Restrict Power User privileges strictly to only those users who absolutely require them, minimizing the attack surface. 2) Implement network-level controls such as Web Application Firewalls (WAFs) to detect and block anomalous requests that modify the userLevel parameter or exhibit suspicious patterns. 3) Enable detailed logging and continuous monitoring of user management activities, focusing on privilege changes and password resets, to detect potential exploitation attempts early. 4) Conduct internal audits of user roles and permissions to identify and remediate any inappropriate privilege assignments. 5) Employ multi-factor authentication (MFA) for all administrative and privileged accounts to reduce the risk of account takeover. 6) Prepare incident response plans specifically addressing privilege escalation scenarios within Terminalfour environments. 7) Engage with the vendor to obtain patches or workarounds as soon as they are available and prioritize their deployment. 8) Educate administrators and security teams about this vulnerability to ensure rapid detection and response. These targeted actions go beyond generic advice and address the specific exploitation vector and impact of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-29T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692f2e1ae0601f8fcd6cf194

Added to database: 12/2/2025, 6:21:14 PM

Last enriched: 12/2/2025, 6:27:12 PM

Last updated: 12/2/2025, 7:28:48 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats