Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2025-4210 | First vendor Publication | 2025-05-02 |
Vendor | Cve | Last vendor Modification | 2025-05-02 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L | |||
---|---|---|---|
Overall CVSS Score | 7.3 | ||
Base Score | 7.3 | Environmental Score | 7.3 |
impact SubScore | 3.4 | Temporal Score | 7.3 |
Exploitabality Sub Score | 3.9 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | Low |
Integrity Impact | Low | Availability Impact | Low |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability classified as critical was found in Casdoor up to 1.811.0. This vulnerability affects the function HandleScim of the file controllers/scim.go of the component SCIM User Creation Endpoint. The manipulation leads to authorization bypass. The attack can be initiated remotely. Upgrading to version 1.812.0 is able to address this issue. The name of the patch is 3d12ac8dc2282369296c3386815c00a06c6a92fe. It is recommended to upgrade the affected component. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4210 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-639 | Access Control Bypass Through User-Controlled Key |
50 % | CWE-285 | Improper Access Control (Authorization) |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2025-05-27 02:58:04 |
|