Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65097: CWE-284: Improper Access Control in rommapp romm

0
High
VulnerabilityCVE-2025-65097cvecve-2025-65097cwe-284cwe-639
Published: Wed Dec 03 2025 (12/03/2025, 19:41:33 UTC)
Source: CVE Database V5
Vendor/Project: rommapp
Product: romm

Description

RomM (ROM Manager) allows users to scan, enrich, browse and play their game collections with a clean and responsive interface. Prior to 4.4.1 and 4.4.1-beta.2, an Authenticated User can delete collections belonging to other users by directly sending a DELETE request to the collection endpoint. No ownership verification is performed before deleting collections. This vulnerability is fixed in 4.4.1 and 4.4.1-beta.2.

AI-Powered Analysis

AILast updated: 12/10/2025, 20:50:47 UTC

Technical Analysis

CVE-2025-65097 is an improper access control vulnerability (CWE-284) identified in the RomM (ROM Manager) application, a tool used to manage and play game collections. The vulnerability exists in versions prior to 4.4.1-beta.2, where the application fails to verify ownership before processing DELETE requests on collection endpoints. An authenticated user can exploit this by sending a direct DELETE HTTP request targeting collections owned by other users, resulting in unauthorized deletion of their game collections. This lack of ownership verification violates access control principles and leads to potential data integrity and availability issues. The vulnerability does not require user interaction beyond authentication and is exploitable remotely over the network (AV:N). The CVSS 4.0 vector indicates low attack complexity (AC:L), no privileges required beyond authentication (PR:L), no user interaction (UI:N), and high impact on integrity (VI:H). The scope is limited to the same security scope (SI:L), and no confidentiality or availability impact is noted. The flaw is fixed in versions 4.4.1 and 4.4.1-beta.2 by implementing proper ownership checks before allowing deletion operations. No known exploits are reported in the wild yet, but the vulnerability's nature and ease of exploitation make it a significant risk for environments where RomM is deployed, especially in multi-user or shared setups.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to environments where RomM is used collaboratively or in multi-user contexts, such as gaming communities, digital libraries, or entertainment platforms. Unauthorized deletion of collections can lead to loss of user data, disruption of services, and potential reputational damage. In enterprises or educational institutions using RomM for managing game collections or digital assets, this could impact operational continuity and user trust. The integrity of user data is directly compromised, and availability is affected due to potential deletion of critical collections. Although confidentiality impact is minimal, the ability of an authenticated user to tamper with other users' data undermines security policies and could be leveraged for further attacks or social engineering. The vulnerability's exploitation requires authentication, which limits exposure but does not eliminate risk, especially if credential compromise or insider threats exist. The lack of known exploits in the wild suggests a window for proactive mitigation before active attacks emerge.

Mitigation Recommendations

1. Upgrade RomM to version 4.4.1 or later, where the vulnerability is patched with proper ownership verification. 2. Implement strict access control policies at the application and network layers to restrict DELETE requests to authorized users only. 3. Monitor application logs for unusual DELETE request patterns or attempts to access collections not owned by the requester. 4. Enforce strong authentication mechanisms and consider multi-factor authentication to reduce risk of credential compromise. 5. Conduct regular audits of user permissions and collection ownership to detect anomalies. 6. If immediate patching is not possible, deploy web application firewalls (WAF) rules to block unauthorized DELETE requests targeting collection endpoints. 7. Educate users about the importance of safeguarding credentials and recognizing suspicious activity. 8. Coordinate with RomM support or vendor for any additional security advisories or hotfixes. 9. Consider isolating RomM instances in segmented network zones to limit lateral movement in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-17T20:55:34.692Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693096f5728fb3f62eb70502

Added to database: 12/3/2025, 8:00:53 PM

Last enriched: 12/10/2025, 8:50:47 PM

Last updated: 1/18/2026, 1:06:10 PM

Views: 95

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats