Skip to main content

CVE-2025-60165: CWE-862 Missing Authorization in HaruTheme Frames

Medium
VulnerabilityCVE-2025-60165cvecve-2025-60165cwe-862
Published: Fri Sep 26 2025 (09/26/2025, 08:32:02 UTC)
Source: CVE Database V5
Vendor/Project: HaruTheme
Product: Frames

Description

Missing Authorization vulnerability in HaruTheme Frames allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Frames: from n/a through 1.5.7.

AI-Powered Analysis

AILast updated: 09/26/2025, 16:24:30 UTC

Technical Analysis

CVE-2025-60165 is a medium-severity vulnerability classified under CWE-862, which pertains to Missing Authorization. This vulnerability affects the HaruTheme Frames product up to version 1.5.7. The core issue is that the product's access control mechanisms are incorrectly configured, allowing unauthorized users with some level of privileges (low privileges, as indicated by PR:L) to perform actions or access resources they should not be authorized to. The vulnerability does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The scope of the vulnerability is unchanged (S:U), meaning the impact is limited to the vulnerable component itself. The impact primarily affects integrity (I:L), with no direct confidentiality (C:N) or availability (A:N) impact. This suggests that an attacker could modify or manipulate data or application state without authorization but cannot read sensitive data or cause denial of service. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published recently on September 26, 2025, and was assigned by Patchstack. The lack of a patch and known exploits indicates that organizations using HaruTheme Frames should prioritize assessing their exposure and implementing mitigations promptly.

Potential Impact

For European organizations using HaruTheme Frames, this vulnerability could lead to unauthorized modification of application data or settings, potentially undermining data integrity and trust in the affected systems. Although it does not directly compromise confidentiality or availability, unauthorized changes could disrupt business processes, lead to incorrect data being processed, or enable further attacks if combined with other vulnerabilities. Organizations in sectors with strict data integrity requirements, such as finance, healthcare, and critical infrastructure, may face compliance risks and operational disruptions. Since the exploit requires only low privileges, attackers who have gained minimal access (e.g., through compromised user accounts or insider threats) could escalate their impact. The remote exploitability increases the risk surface, especially for publicly accessible installations. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits following public disclosure.

Mitigation Recommendations

European organizations should immediately audit their use of HaruTheme Frames and identify all instances and versions deployed. Given the absence of an official patch, organizations should implement compensating controls such as: 1) Restricting network access to the Frames application to trusted IP ranges and VPNs to reduce exposure. 2) Enforcing strict role-based access controls and reviewing user privileges to minimize the number of accounts with low-level access that could exploit this vulnerability. 3) Monitoring application logs and user activities for unusual modification attempts or unauthorized access patterns. 4) Applying web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting access control weaknesses. 5) Preparing for rapid patch deployment once an official fix is released by HaruTheme. Additionally, organizations should conduct penetration testing focused on authorization controls within Frames to identify any other potential weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:28:09.602Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d6bda8c8285d06b1f8f902

Added to database: 9/26/2025, 4:22:00 PM

Last enriched: 9/26/2025, 4:24:30 PM

Last updated: 9/27/2025, 6:34:18 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats