Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66385: CWE-472 External Control of Assumed-Immutable Web Parameter in cerebrate-project Cerebrate

0
Critical
VulnerabilityCVE-2025-66385cvecve-2025-66385cwe-472
Published: Fri Nov 28 2025 (11/28/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: cerebrate-project
Product: Cerebrate

Description

UsersController::edit in Cerebrate before 1.30 allows an authenticated non-privileged user to escalate their privileges (e.g., obtain a higher role such as admin) via the user-edit endpoint by supplying or modifying role_id or organisation_id fields in the edit request.

AI-Powered Analysis

AILast updated: 11/28/2025, 07:16:30 UTC

Technical Analysis

CVE-2025-66385 is a critical security vulnerability identified in the Cerebrate project, affecting versions prior to 1.30. The vulnerability is classified under CWE-472, which involves external control of an assumed-immutable web parameter. Specifically, the UsersController::edit function fails to properly validate or restrict changes to the role_id and organisation_id fields in the user-edit endpoint. This flaw allows an authenticated user with non-privileged access to escalate their privileges by modifying these parameters in the HTTP request, effectively granting themselves higher roles such as admin or altering their organizational affiliation. The vulnerability is exploitable remotely over the network without requiring user interaction and has a low attack complexity, making it highly accessible to attackers with legitimate credentials. The CVSS 4.0 base score of 9.4 reflects the critical nature of this flaw, with high impact on confidentiality, integrity, and availability. The vulnerability affects all versions before 1.30, with no patches currently linked, and no known exploits reported in the wild. The root cause is insufficient server-side validation and improper assumptions about the immutability of certain web parameters, allowing attackers to override security controls that should restrict privilege changes. This vulnerability could lead to full system compromise, unauthorized data access, and disruption of services.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on Cerebrate for user management or organizational workflows. Successful exploitation could lead to unauthorized administrative access, enabling attackers to manipulate user roles, access sensitive data, modify or delete critical information, and disrupt business operations. The compromise of administrative accounts could facilitate further lateral movement within networks, increasing the risk of data breaches and compliance violations under regulations such as GDPR. Organizations in sectors with high regulatory scrutiny, such as finance, healthcare, and government, could face severe reputational and financial damage. Additionally, the ability to alter organisation_id fields could allow attackers to impersonate or infiltrate other organizational units, complicating incident response and forensic investigations. The lack of known exploits in the wild provides a window for proactive mitigation, but the critical severity demands immediate attention to prevent potential exploitation.

Mitigation Recommendations

1. Immediate upgrade to Cerebrate version 1.30 or later once available, as this version addresses the vulnerability. 2. Until a patch is applied, implement strict server-side validation to reject any user-edit requests that attempt to modify role_id or organisation_id fields unless performed by authorized administrators. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests that include unauthorized parameter modifications. 4. Conduct thorough access reviews and restrict user permissions to the minimum necessary to reduce the risk of privilege escalation. 5. Monitor logs for unusual activity related to user role changes or organization affiliation modifications. 6. Implement multi-factor authentication (MFA) to reduce the risk of compromised credentials being used to exploit this vulnerability. 7. Educate developers and administrators about the risks of assuming immutability of web parameters and enforce secure coding practices to validate all user inputs. 8. Prepare incident response plans to quickly address any signs of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-28T00:00:00.000Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69294930842b163e002c8ea9

Added to database: 11/28/2025, 7:03:12 AM

Last enriched: 11/28/2025, 7:16:30 AM

Last updated: 11/28/2025, 8:28:06 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats