Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67493: CWE-20: Improper Input Validation in homarr-labs homarr

0
High
VulnerabilityCVE-2025-67493cvecve-2025-67493cwe-20cwe-90
Published: Wed Dec 17 2025 (12/17/2025, 21:09:44 UTC)
Source: CVE Database V5
Vendor/Project: homarr-labs
Product: homarr

Description

Homarr is an open-source dashboard. Prior to version 1.45.3, it was possible to craft an input which allowed privilege escalation and getting access to groups of other users due to missing sanitization of inputs in ldap search query. The vulnerability could impact all instances using ldap authentication where a malicious actor had access to a user account. Version 1.45.3 has a patch for the issue.

AI-Powered Analysis

AILast updated: 12/17/2025, 22:22:32 UTC

Technical Analysis

CVE-2025-67493 is a vulnerability identified in the Homarr open-source dashboard software, specifically affecting versions prior to 1.45.3. The root cause is improper input validation (CWE-20) combined with LDAP injection (CWE-90) due to missing sanitization of user inputs in LDAP search queries. This flaw allows an attacker who already has access to a user account to craft malicious input that manipulates LDAP queries, resulting in privilege escalation and unauthorized access to other users' group information. The vulnerability requires the attacker to have authenticated access and involves some user interaction, with an attack complexity rated as high. The CVSS v3.1 base score is 7.5, reflecting high severity with significant impact on confidentiality and integrity, and a low impact on availability. The vulnerability affects all Homarr instances using LDAP authentication prior to version 1.45.3. The vendor has released a patch in version 1.45.3 to address this issue by properly sanitizing LDAP inputs. There are no known exploits in the wild at this time, but the potential for privilege escalation and data exposure makes timely patching critical. This vulnerability is particularly relevant for organizations relying on Homarr dashboards integrated with LDAP for user authentication and group management.

Potential Impact

For European organizations, the impact of CVE-2025-67493 can be significant, especially for those using Homarr dashboards with LDAP authentication. Successful exploitation allows attackers with valid user credentials to escalate privileges and access sensitive group membership information of other users, potentially leading to unauthorized data access, lateral movement within networks, and exposure of confidential information. This undermines confidentiality and integrity of user data and access controls. Although availability impact is low, the breach of access controls can facilitate further attacks or data leaks. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face increased compliance risks and reputational damage if exploited. The vulnerability's requirement for authenticated access limits exposure but does not eliminate risk, as compromised or insider accounts can be leveraged. Given the widespread use of LDAP in enterprise environments across Europe, the vulnerability could affect a broad range of organizations until patched.

Mitigation Recommendations

To mitigate CVE-2025-67493, European organizations should immediately upgrade all Homarr instances to version 1.45.3 or later, which contains the patch for proper input sanitization in LDAP queries. Additionally, organizations should audit and monitor LDAP authentication logs for unusual query patterns or privilege escalations indicative of exploitation attempts. Implement strict access controls and multi-factor authentication (MFA) to reduce the risk of account compromise that could enable exploitation. Conduct regular security reviews of all integrations using LDAP to ensure input validation is enforced. Network segmentation can limit the impact of any compromised accounts. Organizations should also educate users on phishing and credential security to prevent initial account compromise. Finally, maintain up-to-date backups and incident response plans tailored to privilege escalation scenarios involving dashboard tools.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-08T18:49:47.487Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69432d1e058703ef3fc81e16

Added to database: 12/17/2025, 10:22:22 PM

Last enriched: 12/17/2025, 10:22:32 PM

Last updated: 12/18/2025, 10:16:42 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats