CVE-2025-65096: CWE-284: Improper Access Control in rommapp romm
RomM (ROM Manager) allows users to scan, enrich, browse and play their game collections with a clean and responsive interface. Prior to 4.4.1 and 4.4.1-beta.2, users can read private collections / smart collections belonging to other users by directly accessing their IDs via API. No ownership verification or checking if the collection is public/private before returning collection data. This vulnerability is fixed in 4.4.1 and 4.4.1-beta.2.
AI Analysis
Technical Summary
CVE-2025-65096 is a vulnerability classified under CWE-284 (Improper Access Control) and CWE-639 (Authorization Bypass Through User-Controlled Key) affecting RomM (ROM Manager), a software application designed to manage game collections. Versions prior to 4.4.1-beta.2 do not properly verify ownership or privacy settings when users access collections via the API. Specifically, the API allows any user to retrieve private or smart collections belonging to other users simply by specifying the collection ID, without any authentication or authorization checks. This results in unauthorized disclosure of potentially sensitive user data. The vulnerability does not require user interaction or privileges beyond network access, making it relatively easy to exploit remotely. The issue was publicly disclosed and assigned a CVSS 4.0 score of 5.3, indicating a medium severity impact primarily due to confidentiality loss. The flaw was addressed in version 4.4.1 and 4.4.1-beta.2 by implementing proper ownership verification and privacy checks before returning collection data. There are no known active exploits in the wild as of the publication date. This vulnerability highlights the importance of enforcing strict access control and validating user permissions in API endpoints, especially when handling private user data.
Potential Impact
For European organizations, the primary impact of this vulnerability is the unauthorized disclosure of private user collections, which could include sensitive or proprietary information related to game libraries or user preferences. This exposure can lead to privacy violations, reputational damage, and potential regulatory non-compliance under GDPR if personal data is involved. Gaming communities and platforms relying on RomM may face user trust erosion and increased support costs due to data leakage concerns. Although the vulnerability does not allow modification or deletion of data, the confidentiality breach alone is significant. Organizations operating in sectors with strict data protection requirements or those hosting large user bases are particularly at risk. Additionally, attackers could leverage the exposed data for social engineering or targeted attacks. The lack of authentication or user interaction requirements increases the risk of automated or large-scale data harvesting attacks.
Mitigation Recommendations
The primary mitigation is to upgrade all affected RomM instances to version 4.4.1 or later, where the vulnerability is fixed. Organizations should audit their RomM deployments to identify versions below 4.4.1-beta.2 and prioritize patching. Additionally, implement network-level access controls to restrict API access to trusted users or internal networks where feasible. Conduct thorough reviews of API endpoints to ensure proper ownership and privacy checks are enforced consistently. Employ monitoring and logging of API access to detect unusual or unauthorized queries for collection data. Educate users about the importance of updating software promptly and maintaining strong authentication practices. If immediate patching is not possible, consider disabling or restricting the vulnerable API endpoints temporarily. Finally, review privacy policies and data handling procedures to ensure compliance with GDPR and other relevant regulations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Poland, Italy, Spain
CVE-2025-65096: CWE-284: Improper Access Control in rommapp romm
Description
RomM (ROM Manager) allows users to scan, enrich, browse and play their game collections with a clean and responsive interface. Prior to 4.4.1 and 4.4.1-beta.2, users can read private collections / smart collections belonging to other users by directly accessing their IDs via API. No ownership verification or checking if the collection is public/private before returning collection data. This vulnerability is fixed in 4.4.1 and 4.4.1-beta.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-65096 is a vulnerability classified under CWE-284 (Improper Access Control) and CWE-639 (Authorization Bypass Through User-Controlled Key) affecting RomM (ROM Manager), a software application designed to manage game collections. Versions prior to 4.4.1-beta.2 do not properly verify ownership or privacy settings when users access collections via the API. Specifically, the API allows any user to retrieve private or smart collections belonging to other users simply by specifying the collection ID, without any authentication or authorization checks. This results in unauthorized disclosure of potentially sensitive user data. The vulnerability does not require user interaction or privileges beyond network access, making it relatively easy to exploit remotely. The issue was publicly disclosed and assigned a CVSS 4.0 score of 5.3, indicating a medium severity impact primarily due to confidentiality loss. The flaw was addressed in version 4.4.1 and 4.4.1-beta.2 by implementing proper ownership verification and privacy checks before returning collection data. There are no known active exploits in the wild as of the publication date. This vulnerability highlights the importance of enforcing strict access control and validating user permissions in API endpoints, especially when handling private user data.
Potential Impact
For European organizations, the primary impact of this vulnerability is the unauthorized disclosure of private user collections, which could include sensitive or proprietary information related to game libraries or user preferences. This exposure can lead to privacy violations, reputational damage, and potential regulatory non-compliance under GDPR if personal data is involved. Gaming communities and platforms relying on RomM may face user trust erosion and increased support costs due to data leakage concerns. Although the vulnerability does not allow modification or deletion of data, the confidentiality breach alone is significant. Organizations operating in sectors with strict data protection requirements or those hosting large user bases are particularly at risk. Additionally, attackers could leverage the exposed data for social engineering or targeted attacks. The lack of authentication or user interaction requirements increases the risk of automated or large-scale data harvesting attacks.
Mitigation Recommendations
The primary mitigation is to upgrade all affected RomM instances to version 4.4.1 or later, where the vulnerability is fixed. Organizations should audit their RomM deployments to identify versions below 4.4.1-beta.2 and prioritize patching. Additionally, implement network-level access controls to restrict API access to trusted users or internal networks where feasible. Conduct thorough reviews of API endpoints to ensure proper ownership and privacy checks are enforced consistently. Employ monitoring and logging of API access to detect unusual or unauthorized queries for collection data. Educate users about the importance of updating software promptly and maintaining strong authentication practices. If immediate patching is not possible, consider disabling or restricting the vulnerable API endpoints temporarily. Finally, review privacy policies and data handling procedures to ensure compliance with GDPR and other relevant regulations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-17T20:55:34.692Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693096f5728fb3f62eb704ff
Added to database: 12/3/2025, 8:00:53 PM
Last enriched: 12/3/2025, 8:15:16 PM
Last updated: 12/4/2025, 3:47:39 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Nation-State Attack or Compromised Government? [Guest Diary], (Thu, Dec 4th)
MediumCVE-2025-62173: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in FreePBX security-reporting
HighCVE-2025-64055: n/a
UnknownCVE-2025-66404: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in Flux159 mcp-server-kubernetes
MediumCVE-2025-66293: CWE-125: Out-of-bounds Read in pnggroup libpng
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.