Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65096: CWE-284: Improper Access Control in rommapp romm

0
Medium
VulnerabilityCVE-2025-65096cvecve-2025-65096cwe-284cwe-639
Published: Wed Dec 03 2025 (12/03/2025, 19:39:53 UTC)
Source: CVE Database V5
Vendor/Project: rommapp
Product: romm

Description

RomM (ROM Manager) allows users to scan, enrich, browse and play their game collections with a clean and responsive interface. Prior to 4.4.1 and 4.4.1-beta.2, users can read private collections / smart collections belonging to other users by directly accessing their IDs via API. No ownership verification or checking if the collection is public/private before returning collection data. This vulnerability is fixed in 4.4.1 and 4.4.1-beta.2.

AI-Powered Analysis

AILast updated: 12/03/2025, 20:15:16 UTC

Technical Analysis

CVE-2025-65096 is a vulnerability classified under CWE-284 (Improper Access Control) and CWE-639 (Authorization Bypass Through User-Controlled Key) affecting RomM (ROM Manager), a software application designed to manage game collections. Versions prior to 4.4.1-beta.2 do not properly verify ownership or privacy settings when users access collections via the API. Specifically, the API allows any user to retrieve private or smart collections belonging to other users simply by specifying the collection ID, without any authentication or authorization checks. This results in unauthorized disclosure of potentially sensitive user data. The vulnerability does not require user interaction or privileges beyond network access, making it relatively easy to exploit remotely. The issue was publicly disclosed and assigned a CVSS 4.0 score of 5.3, indicating a medium severity impact primarily due to confidentiality loss. The flaw was addressed in version 4.4.1 and 4.4.1-beta.2 by implementing proper ownership verification and privacy checks before returning collection data. There are no known active exploits in the wild as of the publication date. This vulnerability highlights the importance of enforcing strict access control and validating user permissions in API endpoints, especially when handling private user data.

Potential Impact

For European organizations, the primary impact of this vulnerability is the unauthorized disclosure of private user collections, which could include sensitive or proprietary information related to game libraries or user preferences. This exposure can lead to privacy violations, reputational damage, and potential regulatory non-compliance under GDPR if personal data is involved. Gaming communities and platforms relying on RomM may face user trust erosion and increased support costs due to data leakage concerns. Although the vulnerability does not allow modification or deletion of data, the confidentiality breach alone is significant. Organizations operating in sectors with strict data protection requirements or those hosting large user bases are particularly at risk. Additionally, attackers could leverage the exposed data for social engineering or targeted attacks. The lack of authentication or user interaction requirements increases the risk of automated or large-scale data harvesting attacks.

Mitigation Recommendations

The primary mitigation is to upgrade all affected RomM instances to version 4.4.1 or later, where the vulnerability is fixed. Organizations should audit their RomM deployments to identify versions below 4.4.1-beta.2 and prioritize patching. Additionally, implement network-level access controls to restrict API access to trusted users or internal networks where feasible. Conduct thorough reviews of API endpoints to ensure proper ownership and privacy checks are enforced consistently. Employ monitoring and logging of API access to detect unusual or unauthorized queries for collection data. Educate users about the importance of updating software promptly and maintaining strong authentication practices. If immediate patching is not possible, consider disabling or restricting the vulnerable API endpoints temporarily. Finally, review privacy policies and data handling procedures to ensure compliance with GDPR and other relevant regulations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-17T20:55:34.692Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693096f5728fb3f62eb704ff

Added to database: 12/3/2025, 8:00:53 PM

Last enriched: 12/3/2025, 8:15:16 PM

Last updated: 12/4/2025, 3:47:39 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats