Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58386: n/a

0
Critical
VulnerabilityCVE-2025-58386cvecve-2025-58386
Published: Tue Dec 02 2025 (12/02/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

In Terminalfour 8 through 8.4.1.1, the userLevel parameter in the user management function is not subject to proper server-side authorization checks. A Power User can intercept and modify this parameter to assign the Administrator role to other existing lower-privileged accounts, or invite a new lower-privileged account and escalate its privileges. While manipulating this request, the Power User can also change the target account's password, effectively taking full control of it.

AI-Powered Analysis

AILast updated: 12/09/2025, 19:08:42 UTC

Technical Analysis

CVE-2025-58386 is a critical security vulnerability identified in Terminalfour content management system versions 8 through 8.4.1.1. The root cause is the lack of proper server-side authorization validation on the userLevel parameter within the user management functionality. This parameter controls the privilege level assigned to user accounts. A user with Power User privileges can intercept and manipulate requests to escalate privileges by assigning the Administrator role to other existing lower-privileged accounts or newly invited accounts. Furthermore, the attacker can change the password of the targeted account during this manipulation, effectively gaining full control over that account. The vulnerability does not require prior authentication or user interaction, and it can be exploited remotely over the network. The CVSS v3.1 base score is 9.8, indicating a critical severity due to its high impact on confidentiality, integrity, and availability. The vulnerability corresponds to CWE-285 (Improper Authorization). Although no public exploits have been reported yet, the ease of exploitation and the potential for complete system compromise make this a significant threat. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for immediate mitigation efforts.

Potential Impact

For European organizations using Terminalfour CMS versions 8 through 8.4.1.1, this vulnerability poses a severe risk. Exploitation allows attackers to escalate privileges from Power User to Administrator, enabling full control over the CMS environment. This can lead to unauthorized data access, modification, or deletion, disruption of website availability, and potential deployment of malicious content or backdoors. Given Terminalfour's use in higher education, government, and enterprise sectors across Europe, the impact could extend to sensitive personal data breaches, reputational damage, and regulatory non-compliance under GDPR. The ability to change account passwords further exacerbates the risk by locking out legitimate administrators and hindering incident response. The remote and unauthenticated nature of the exploit increases the likelihood of widespread attacks if not mitigated promptly.

Mitigation Recommendations

European organizations should immediately audit their Terminalfour CMS installations to identify affected versions (8 through 8.4.1.1). Until an official patch is released, implement strict network-level access controls to limit access to the user management interface only to trusted administrators. Employ Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized modifications of the userLevel parameter. Monitor logs for unusual privilege escalation attempts or password changes. Enforce multi-factor authentication (MFA) for all administrative accounts to reduce the impact of compromised credentials. Regularly back up CMS data and configurations to enable rapid recovery. Engage with the vendor for timelines on patch availability and apply updates immediately upon release. Additionally, conduct user privilege reviews to minimize the number of Power Users and restrict their capabilities where possible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-29T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692f2e1ae0601f8fcd6cf194

Added to database: 12/2/2025, 6:21:14 PM

Last enriched: 12/9/2025, 7:08:42 PM

Last updated: 1/16/2026, 10:11:09 PM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats