Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65097: CWE-284: Improper Access Control in rommapp romm

0
High
VulnerabilityCVE-2025-65097cvecve-2025-65097cwe-284cwe-639
Published: Wed Dec 03 2025 (12/03/2025, 19:41:33 UTC)
Source: CVE Database V5
Vendor/Project: rommapp
Product: romm

Description

RomM (ROM Manager) allows users to scan, enrich, browse and play their game collections with a clean and responsive interface. Prior to 4.4.1 and 4.4.1-beta.2, an Authenticated User can delete collections belonging to other users by directly sending a DELETE request to the collection endpoint. No ownership verification is performed before deleting collections. This vulnerability is fixed in 4.4.1 and 4.4.1-beta.2.

AI-Powered Analysis

AILast updated: 12/03/2025, 20:14:51 UTC

Technical Analysis

CVE-2025-65097 is an improper access control vulnerability (CWE-284) identified in the RomM (ROM Manager) application, which is used for managing game collections. The vulnerability exists in versions prior to 4.4.1-beta.2, where the application fails to verify ownership before processing DELETE requests on collections. An authenticated user can exploit this by sending a direct DELETE HTTP request to the collection endpoint, deleting collections owned by other users without authorization. This lack of ownership verification violates access control principles and can lead to unauthorized data deletion. The vulnerability does not require user interaction beyond the authenticated request and does not require elevated privileges beyond authentication. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on integrity (VI:H) but no impact on confidentiality or availability. The vulnerability was reserved on 2025-11-17 and published on 2025-12-03, with no known exploits in the wild at the time of publication. The issue is resolved in RomM versions 4.4.1 and 4.4.1-beta.2 by implementing proper ownership verification before allowing deletion of collections.

Potential Impact

For European organizations using RomM in environments where multiple users manage game collections, this vulnerability poses a significant risk to data integrity and availability. Unauthorized deletion of collections can lead to loss of valuable user data, disruption of services, and potential user dissatisfaction. In scenarios where RomM is integrated into larger systems or used in gaming communities, this could result in operational disruption and reputational damage. Although confidentiality is not directly impacted, the ability for one user to delete another's data undermines trust and could facilitate further malicious activities if combined with other vulnerabilities. The ease of exploitation and lack of required user interaction increase the likelihood of abuse. Organizations relying on RomM for digital asset management must consider this vulnerability critical to address to maintain service reliability and user trust.

Mitigation Recommendations

The primary mitigation is to upgrade RomM to version 4.4.1 or later, where the vulnerability is fixed by enforcing ownership verification on DELETE requests. Organizations should audit their current RomM deployments to identify affected versions and prioritize patching. Additionally, implement monitoring and logging of DELETE requests to detect unusual or unauthorized deletion attempts. Restrict access to the RomM API endpoints to trusted networks or users where possible. Employ role-based access controls (RBAC) to limit permissions to only those users who require deletion capabilities. Conduct regular security reviews of access control mechanisms in multi-user applications. If immediate patching is not feasible, consider implementing a web application firewall (WAF) rule to block unauthorized DELETE requests or require additional authentication factors for destructive actions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-17T20:55:34.692Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693096f5728fb3f62eb70502

Added to database: 12/3/2025, 8:00:53 PM

Last enriched: 12/3/2025, 8:14:51 PM

Last updated: 12/5/2025, 3:14:03 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats