CVE-2025-60165: CWE-862 Missing Authorization in HaruTheme Frames
Missing Authorization vulnerability in HaruTheme Frames allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Frames: from n/a through 1.5.7.
AI Analysis
Technical Summary
CVE-2025-60165 is a medium-severity vulnerability classified under CWE-862, which pertains to Missing Authorization. This vulnerability affects the HaruTheme Frames product up to version 1.5.7. The core issue is that the product's access control mechanisms are incorrectly configured, allowing unauthorized users with some level of privileges (low privileges, as indicated by PR:L) to perform actions or access resources they should not be authorized to. The vulnerability does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The scope of the vulnerability is unchanged (S:U), meaning the impact is limited to the vulnerable component itself. The impact primarily affects integrity (I:L), with no direct confidentiality (C:N) or availability (A:N) impact. This suggests that an attacker could modify or manipulate data or application state without authorization but cannot read sensitive data or cause denial of service. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published recently on September 26, 2025, and was assigned by Patchstack. The lack of a patch and known exploits indicates that organizations using HaruTheme Frames should prioritize assessing their exposure and implementing mitigations promptly.
Potential Impact
For European organizations using HaruTheme Frames, this vulnerability could lead to unauthorized modification of application data or settings, potentially undermining data integrity and trust in the affected systems. Although it does not directly compromise confidentiality or availability, unauthorized changes could disrupt business processes, lead to incorrect data being processed, or enable further attacks if combined with other vulnerabilities. Organizations in sectors with strict data integrity requirements, such as finance, healthcare, and critical infrastructure, may face compliance risks and operational disruptions. Since the exploit requires only low privileges, attackers who have gained minimal access (e.g., through compromised user accounts or insider threats) could escalate their impact. The remote exploitability increases the risk surface, especially for publicly accessible installations. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits following public disclosure.
Mitigation Recommendations
European organizations should immediately audit their use of HaruTheme Frames and identify all instances and versions deployed. Given the absence of an official patch, organizations should implement compensating controls such as: 1) Restricting network access to the Frames application to trusted IP ranges and VPNs to reduce exposure. 2) Enforcing strict role-based access controls and reviewing user privileges to minimize the number of accounts with low-level access that could exploit this vulnerability. 3) Monitoring application logs and user activities for unusual modification attempts or unauthorized access patterns. 4) Applying web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting access control weaknesses. 5) Preparing for rapid patch deployment once an official fix is released by HaruTheme. Additionally, organizations should conduct penetration testing focused on authorization controls within Frames to identify any other potential weaknesses.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-60165: CWE-862 Missing Authorization in HaruTheme Frames
Description
Missing Authorization vulnerability in HaruTheme Frames allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Frames: from n/a through 1.5.7.
AI-Powered Analysis
Technical Analysis
CVE-2025-60165 is a medium-severity vulnerability classified under CWE-862, which pertains to Missing Authorization. This vulnerability affects the HaruTheme Frames product up to version 1.5.7. The core issue is that the product's access control mechanisms are incorrectly configured, allowing unauthorized users with some level of privileges (low privileges, as indicated by PR:L) to perform actions or access resources they should not be authorized to. The vulnerability does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The scope of the vulnerability is unchanged (S:U), meaning the impact is limited to the vulnerable component itself. The impact primarily affects integrity (I:L), with no direct confidentiality (C:N) or availability (A:N) impact. This suggests that an attacker could modify or manipulate data or application state without authorization but cannot read sensitive data or cause denial of service. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published recently on September 26, 2025, and was assigned by Patchstack. The lack of a patch and known exploits indicates that organizations using HaruTheme Frames should prioritize assessing their exposure and implementing mitigations promptly.
Potential Impact
For European organizations using HaruTheme Frames, this vulnerability could lead to unauthorized modification of application data or settings, potentially undermining data integrity and trust in the affected systems. Although it does not directly compromise confidentiality or availability, unauthorized changes could disrupt business processes, lead to incorrect data being processed, or enable further attacks if combined with other vulnerabilities. Organizations in sectors with strict data integrity requirements, such as finance, healthcare, and critical infrastructure, may face compliance risks and operational disruptions. Since the exploit requires only low privileges, attackers who have gained minimal access (e.g., through compromised user accounts or insider threats) could escalate their impact. The remote exploitability increases the risk surface, especially for publicly accessible installations. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits following public disclosure.
Mitigation Recommendations
European organizations should immediately audit their use of HaruTheme Frames and identify all instances and versions deployed. Given the absence of an official patch, organizations should implement compensating controls such as: 1) Restricting network access to the Frames application to trusted IP ranges and VPNs to reduce exposure. 2) Enforcing strict role-based access controls and reviewing user privileges to minimize the number of accounts with low-level access that could exploit this vulnerability. 3) Monitoring application logs and user activities for unusual modification attempts or unauthorized access patterns. 4) Applying web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting access control weaknesses. 5) Preparing for rapid patch deployment once an official fix is released by HaruTheme. Additionally, organizations should conduct penetration testing focused on authorization controls within Frames to identify any other potential weaknesses.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-25T15:28:09.602Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d6bda8c8285d06b1f8f902
Added to database: 9/26/2025, 4:22:00 PM
Last enriched: 9/26/2025, 4:24:30 PM
Last updated: 9/27/2025, 6:34:18 PM
Views: 8
Related Threats
CVE-2025-11080: Improper Authorization in zhuimengshaonian wisdom-education
MediumCVE-2025-11079: File and Directory Information Exposure in Campcodes Farm Management System
MediumCVE-2025-11078: Unrestricted Upload in itsourcecode Open Source Job Portal
MediumCVE-2025-11077: SQL Injection in Campcodes Online Learning Management System
MediumCVE-2025-11076: SQL Injection in Campcodes Online Learning Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.