Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67796: n/a

0
High
VulnerabilityCVE-2025-67796cvecve-2025-67796
Published: Mon May 04 2026 (05/04/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

IKUS Rdiffweb versions before 2. 10. 5 contain an improper authorization vulnerability that allows attackers with any valid or stolen access token to impersonate other users. The API fails to enforce proper binding between the authenticated user and the targeted user or tenant, enabling crafted requests to access or modify data belonging to other users and potentially perform privileged actions. This flaw can lead to unauthorized cross-tenant access. The issue is fixed in version 2. 10. 6.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/04/2026, 19:36:50 UTC

Technical Analysis

The vulnerability in IKUS Rdiffweb prior to version 2.10.5 is due to improper authorization controls in the API. Specifically, the system does not verify that the authenticated subject matches the targeted user or tenant in API requests. As a result, an attacker possessing any valid or stolen access token can craft requests to read or modify data of other users, and in some cases execute privileged operations. This can lead to unauthorized data exposure and cross-tenant access. The vendor addressed this flaw in version 2.10.6.

Potential Impact

An attacker with any valid or stolen access token can bypass authorization checks to access or modify data of other users, potentially across tenant boundaries. This can result in unauthorized data disclosure, data manipulation, and execution of privileged actions, compromising confidentiality and integrity of user data within the affected system.

Mitigation Recommendations

A fix is available in IKUS Rdiffweb version 2.10.6. Users and administrators should upgrade to this version to remediate the improper authorization vulnerability. No additional mitigation guidance is provided or required beyond applying the official fix.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-12T00:00:00.000Z
Cvss Version
null
State
PUBLISHED
Remediation Level
null

Threat ID: 69f8f1b7cbff5d861042a38a

Added to database: 5/4/2026, 7:21:27 PM

Last enriched: 5/4/2026, 7:36:50 PM

Last updated: 5/4/2026, 8:32:15 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses