Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66149: CWE-862 Missing Authorization in merkulove UnGrabber

0
Medium
VulnerabilityCVE-2025-66149cvecve-2025-66149cwe-862
Published: Wed Dec 31 2025 (12/31/2025, 18:38:14 UTC)
Source: CVE Database V5
Vendor/Project: merkulove
Product: UnGrabber

Description

Missing Authorization vulnerability in merkulove UnGrabber allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects UnGrabber: from n/a through 3.1.3.

AI-Powered Analysis

AILast updated: 01/21/2026, 00:36:12 UTC

Technical Analysis

CVE-2025-66149 is a vulnerability identified in the merkulove UnGrabber software, affecting versions up to 3.1.3. The root cause is a missing authorization check (CWE-862), meaning that certain functions or operations within the application do not properly verify whether the requesting user has the necessary permissions to perform them. This misconfiguration allows an attacker with some level of privileges (PR:L - privileges required: low) to execute unauthorized actions remotely (AV:N - attack vector: network) without requiring user interaction (UI:N). The vulnerability impacts the integrity and availability of the system, as unauthorized changes or disruptions can be made, although confidentiality is not directly affected. The attack complexity is low (AC:L), indicating that exploitation does not require sophisticated conditions or knowledge. The scope is unchanged (S:U), meaning the vulnerability affects resources within the same security scope. No patches or known exploits are currently available, but the vulnerability has been publicly disclosed and assigned a CVSS v3.1 score of 5.4, categorizing it as medium severity. The lack of authorization checks suggests that internal threat actors or compromised accounts could leverage this flaw to escalate privileges or disrupt operations. The UnGrabber product is used for specific content or data handling tasks, and improper access control could lead to unauthorized manipulation or denial of service within affected environments.

Potential Impact

For European organizations, the missing authorization vulnerability in UnGrabber could lead to unauthorized modification or disruption of critical processes managed by this software, impacting operational integrity and availability. While confidentiality is not directly compromised, the integrity loss could affect data accuracy and trustworthiness, potentially disrupting business workflows or content delivery. Organizations relying on UnGrabber in internal networks or exposed environments may face risks from insider threats or lateral movement by attackers who gain low-level access. The absence of user interaction in exploitation means automated attacks or worm-like propagation within networks are possible, increasing the threat surface. Disruptions could affect sectors such as media, digital content management, or any industry using merkulove products for content extraction or processing. The medium severity indicates a moderate but tangible risk, especially for organizations with insufficient access control policies or monitoring. The lack of patches means that mitigation relies on compensating controls until a fix is available.

Mitigation Recommendations

1. Conduct a thorough access control audit on all UnGrabber installations to identify and remediate any missing or weak authorization checks. 2. Implement strict role-based access control (RBAC) policies ensuring users have only the minimum necessary privileges. 3. Segment networks to isolate UnGrabber systems from broader enterprise networks, limiting exposure to potential attackers. 4. Monitor logs and system behavior for unusual or unauthorized actions, focusing on privilege escalation attempts or unexpected changes. 5. Restrict remote access to UnGrabber systems using VPNs or secure gateways with multi-factor authentication. 6. Engage with merkulove or trusted security vendors to obtain patches or updates as soon as they become available. 7. Educate internal users about the risks of privilege misuse and enforce strong credential management practices. 8. Consider deploying application-layer firewalls or intrusion detection systems that can detect anomalous requests targeting UnGrabber. 9. Maintain an incident response plan tailored to address potential exploitation of authorization vulnerabilities. 10. Regularly review and update security policies to adapt to emerging threats related to access control weaknesses.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-11-21T11:23:07.864Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6955a05adb813ff03e045d7b

Added to database: 12/31/2025, 10:14:50 PM

Last enriched: 1/21/2026, 12:36:12 AM

Last updated: 2/7/2026, 9:16:10 PM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats