Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66402: CWE-862: Missing Authorization in misskey-dev misskey

0
High
VulnerabilityCVE-2025-66402cvecve-2025-66402cwe-862
Published: Mon Dec 15 2025 (12/15/2025, 23:09:57 UTC)
Source: CVE Database V5
Vendor/Project: misskey-dev
Product: misskey

Description

Misskey is an open source, federated social media platform. Starting in version 13.0.0-beta.16 and prior to version 2025.12.0, an actor who does not have permission to view favorites or clips can can export the posts and view the contents. Version 2025.12.0 fixes the issue.

AI-Powered Analysis

AILast updated: 12/16/2025, 04:07:49 UTC

Technical Analysis

CVE-2025-66402 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Misskey open-source federated social media platform. This flaw exists in versions starting from 13.0.0-beta.16 up to but excluding 2025.12.0. The vulnerability allows an unauthorized actor—one who lacks permission to view favorites or clips—to export posts and view their contents. This means that access control checks are improperly implemented or missing in the export functionality, enabling data exposure without proper authorization. The vulnerability can be exploited remotely over the network without requiring user interaction or elevated privileges, making it relatively easy to exploit. The impact is primarily on confidentiality, as unauthorized users can access potentially sensitive or private user-generated content. The issue was addressed and fixed in version 2025.12.0 of Misskey. There are no known exploits in the wild at the time of publication, but the high CVSS 4.0 score of 7.1 indicates a serious risk if left unpatched. The vulnerability affects the integrity of access control mechanisms, undermining trust in the platform's data privacy guarantees. Given Misskey's role as a federated social media platform, the exposure of favorites and clips can lead to privacy violations and potential reputational damage for organizations and users relying on the platform for secure communications.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of user data hosted on Misskey instances. Organizations using Misskey to manage internal or community social media interactions could experience unauthorized data disclosure, potentially exposing sensitive or private posts. This can lead to privacy violations, regulatory non-compliance (e.g., GDPR breaches), and reputational damage. The federated nature of Misskey means that a compromised instance could affect trust across interconnected nodes, amplifying the impact. Since the vulnerability requires no user interaction and can be exploited remotely, attackers can automate data extraction at scale. This is particularly concerning for organizations in sectors with strict data privacy requirements such as healthcare, education, and government. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as threat actors may develop exploits rapidly once the vulnerability is public. Failure to patch promptly could also expose organizations to targeted attacks leveraging this flaw for espionage or data harvesting.

Mitigation Recommendations

The primary mitigation is to upgrade all affected Misskey instances to version 2025.12.0 or later, where the authorization checks have been properly implemented and the vulnerability fixed. Organizations should audit their current Misskey deployments to identify affected versions and prioritize patching. In addition to patching, administrators should review and tighten access control policies related to favorites, clips, and export functionalities to ensure only authorized users have access. Implement network-level protections such as IP whitelisting or VPN access for administrative interfaces to reduce exposure. Monitoring and logging export activities can help detect anomalous behavior indicative of exploitation attempts. Given the federated architecture, organizations should also verify the security posture of federated peers to limit risk propagation. Finally, educating users about the importance of updating software and reporting suspicious activity can enhance overall security posture.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-28T23:33:56.364Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6940db0754c229a9f5cc423e

Added to database: 12/16/2025, 4:07:35 AM

Last enriched: 12/16/2025, 4:07:49 AM

Last updated: 12/16/2025, 9:48:23 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats