Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58824: CWE-862 Missing Authorization in webriti Shk Corporate

0
Medium
VulnerabilityCVE-2025-58824cvecve-2025-58824cwe-862
Published: Fri Sep 05 2025 (09/05/2025, 13:45:20 UTC)
Source: CVE Database V5
Vendor/Project: webriti
Product: Shk Corporate

Description

Missing Authorization vulnerability in webriti Shk Corporate allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Shk Corporate: from n/a through 2.4.1.1.

AI-Powered Analysis

AILast updated: 09/12/2025, 23:58:38 UTC

Technical Analysis

CVE-2025-58824 is a medium-severity vulnerability classified under CWE-862 (Missing Authorization) affecting the webriti Shk Corporate product up to version 2.4.1.1. This vulnerability arises due to incorrectly configured access control security levels, which means that certain operations or resources within the Shk Corporate application may be accessible without proper authorization checks. An attacker with at least low-level privileges (PR:L) can exploit this vulnerability remotely (AV:N) without requiring user interaction (UI:N). The vulnerability impacts the integrity of the system by allowing unauthorized modification or manipulation of data or application state, but it does not affect confidentiality or availability. The CVSS 3.1 base score is 4.3, reflecting a medium risk level. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability could allow an attacker to bypass intended access restrictions, potentially leading to unauthorized changes within the application environment, which could facilitate further attacks or data corruption. Since the vulnerability requires some level of privilege, it is likely that an attacker would need to have an account or some form of authenticated access to the system to exploit this issue.

Potential Impact

For European organizations using webriti Shk Corporate, this vulnerability poses a risk primarily to the integrity of their corporate data and internal processes managed through the affected software. Unauthorized modification of data or settings could disrupt business operations, lead to inaccurate reporting, or facilitate privilege escalation if combined with other vulnerabilities. Although confidentiality and availability are not directly impacted, the integrity compromise can have downstream effects on trustworthiness of data and compliance with regulatory frameworks such as GDPR, which mandates data accuracy and integrity. Organizations in sectors such as finance, healthcare, and government, where data integrity is critical, may face increased risk. Additionally, if exploited in a multi-tenant or shared environment, this could lead to cross-user impact. The lack of known exploits in the wild suggests a window of opportunity for proactive mitigation before widespread abuse occurs.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement compensating controls immediately. These include: 1) Conducting a thorough review of user roles and permissions within Shk Corporate to ensure the principle of least privilege is enforced, minimizing the number of users with elevated privileges. 2) Implementing strict network segmentation and access controls to limit exposure of the Shk Corporate application to only trusted internal networks and users. 3) Monitoring and logging all access and modification attempts within the application to detect anomalous or unauthorized activities promptly. 4) Applying application-layer firewalls or web application firewalls (WAFs) with custom rules to block suspicious requests that attempt to exploit access control weaknesses. 5) Engaging with the vendor (webriti) to obtain updates on patch availability and applying patches immediately upon release. 6) Conducting internal penetration testing focused on access control mechanisms to identify and remediate similar weaknesses. 7) Educating users about the importance of secure authentication and reporting suspicious behavior. These targeted measures will reduce the attack surface and limit the potential impact until a formal patch is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-05T10:49:34.050Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68baeaa357c5b37b67a46078

Added to database: 9/5/2025, 1:50:27 PM

Last enriched: 9/12/2025, 11:58:38 PM

Last updated: 10/18/2025, 7:19:20 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats