Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66149: CWE-862 Missing Authorization in merkulove UnGrabber

0
Medium
VulnerabilityCVE-2025-66149cvecve-2025-66149cwe-862
Published: Wed Dec 31 2025 (12/31/2025, 18:38:14 UTC)
Source: CVE Database V5
Vendor/Project: merkulove
Product: UnGrabber

Description

Missing Authorization vulnerability in merkulove UnGrabber allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects UnGrabber: from n/a through 3.1.3.

AI-Powered Analysis

AILast updated: 12/31/2025, 22:16:14 UTC

Technical Analysis

CVE-2025-66149 is classified under CWE-862, indicating a Missing Authorization vulnerability in the merkulove UnGrabber software, affecting all versions up to 3.1.3. This vulnerability stems from improperly configured access control mechanisms that fail to adequately verify whether a user has the necessary permissions before allowing certain actions. The CVSS 3.1 score of 5.4 (medium severity) reflects that the vulnerability can be exploited remotely over the network (AV:N) with low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N). The impact affects integrity and availability (I:L, A:L) but not confidentiality. An attacker with limited privileges could exploit this flaw to perform unauthorized operations, potentially modifying or disrupting system functions or data managed by UnGrabber. Since no patches or known exploits currently exist, the vulnerability represents a latent risk that could be leveraged once exploit code becomes available. The vulnerability’s presence in a tool like UnGrabber, which is used for content or data extraction tasks, could lead to unauthorized manipulation or denial of service conditions, impacting dependent systems or workflows.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to the integrity and availability of systems using merkulove UnGrabber. Unauthorized actions could disrupt business processes, corrupt data, or cause service interruptions. Sectors relying on UnGrabber for content management, data extraction, or automation may experience operational degradation or data integrity issues. Although confidentiality is not directly impacted, the disruption of services or data manipulation could have downstream effects on compliance, customer trust, and operational continuity. The requirement for some privilege level to exploit means insider threats or compromised accounts pose a significant risk vector. Organizations with remote access to UnGrabber services are particularly vulnerable due to the network attack vector. The absence of known exploits currently reduces immediate risk but also means organizations should proactively address the vulnerability before exploitation occurs.

Mitigation Recommendations

1. Conduct a thorough access control audit of all UnGrabber instances to ensure authorization checks are correctly implemented and enforced. 2. Restrict UnGrabber user privileges to the minimum necessary, avoiding granting elevated permissions to untrusted users or services. 3. Monitor logs and system behavior for unusual or unauthorized actions that could indicate exploitation attempts. 4. Isolate UnGrabber deployments within segmented network zones to limit exposure to potential attackers. 5. Implement multi-factor authentication (MFA) for accounts with privileges to UnGrabber to reduce risk from compromised credentials. 6. Engage with merkulove for updates and apply patches promptly once released. 7. Consider temporary compensating controls such as disabling non-essential features or restricting network access until a patch is available. 8. Educate administrators and users about the risks of privilege misuse and the importance of secure configuration.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-11-21T11:23:07.864Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6955a05adb813ff03e045d7b

Added to database: 12/31/2025, 10:14:50 PM

Last enriched: 12/31/2025, 10:16:14 PM

Last updated: 1/7/2026, 4:12:29 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats