Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62395: Improper Access Control

0
Medium
VulnerabilityCVE-2025-62395cvecve-2025-62395
Published: Thu Oct 23 2025 (10/23/2025, 11:29:29 UTC)
Source: CVE Database V5

Description

A flaw in the cohort search web service allowed users with permissions in lower contexts to access cohort information from the system context, revealing restricted administrative data.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 15:49:37 UTC

Technical Analysis

CVE-2025-62395 is a security vulnerability classified as improper access control within a cohort search web service component. The flaw allows users who have permissions limited to lower security contexts to bypass intended access restrictions and retrieve cohort information from the system context, which is normally reserved for administrative or highly privileged users. This results in unauthorized disclosure of sensitive administrative data. The vulnerability affects multiple versions of the software, specifically 4.1.0, 4.4.0, 4.5.0, and 5.0.0. According to the CVSS v3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N), the attack can be performed remotely over the network with low attack complexity, requiring privileges at a lower context level but no user interaction. The impact is limited to confidentiality, with no integrity or availability consequences. No known exploits have been reported in the wild, but the vulnerability poses a risk of sensitive data leakage if exploited. The root cause is insufficient enforcement of access control policies in the web service, allowing privilege escalation in data access boundaries. The vulnerability was reserved and published in October 2025 by the Fedora assigner. No patches or mitigation links are currently provided, indicating the need for immediate attention by affected organizations.

Potential Impact

The primary impact of CVE-2025-62395 is unauthorized disclosure of sensitive administrative cohort data, which could lead to information leakage and potential reconnaissance by attackers. While the vulnerability does not affect data integrity or system availability, the exposure of restricted administrative information can aid attackers in planning further attacks or gaining deeper system insights. Organizations relying on the affected software versions may face compliance and privacy risks if sensitive data is accessed by unauthorized users. The requirement of lower-level privileges to exploit the vulnerability means that insider threats or compromised accounts with limited access could escalate their visibility into sensitive data. Although no active exploitation is currently known, the vulnerability could be targeted in the future, especially in environments where cohort data is critical to operations or contains personally identifiable information (PII). The medium CVSS score reflects moderate risk, but the impact could be significant depending on the sensitivity of the exposed data and the organization's security posture.

Mitigation Recommendations

1. Immediate mitigation involves restricting access to the cohort search web service to only trusted and necessary users, minimizing the number of accounts with any level of permission in the affected contexts. 2. Implement strict role-based access control (RBAC) policies and validate that access checks are enforced correctly at all context levels within the web service. 3. Monitor and audit access logs for unusual or unauthorized attempts to query cohort information, focusing on users with lower-level permissions. 4. If available, apply vendor patches or updates addressing this vulnerability as soon as they are released. 5. Employ network segmentation and firewall rules to limit exposure of the vulnerable service to only essential internal or external networks. 6. Conduct a thorough review of the web service's access control mechanisms and perform penetration testing to identify and remediate similar access control weaknesses. 7. Educate administrators and users about the risk of privilege escalation and enforce strong authentication and account management practices to reduce the risk of compromised lower-privilege accounts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
fedora
Date Reserved
2025-10-13T10:12:30.925Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fa15ae457d6b06b51715d6

Added to database: 10/23/2025, 11:46:54 AM

Last enriched: 2/27/2026, 3:49:37 PM

Last updated: 3/24/2026, 6:20:55 AM

Views: 157

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses