Executive Summary

Informations
Name CVE-2025-23367 First vendor Publication 2025-01-30
Vendor Cve Last vendor Modification 2025-01-31

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the server. A user with a Monitor or Auditor role is supposed to have only read access permissions and should not be able to suspend the server. The vulnerability is caused by the Suspend and Resume handlers not performing authorization checks to validate whether the current user has the required permissions to proceed with the action.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23367

Sources (Detail)

https://access.redhat.com/security/cve/CVE-2025-23367
https://bugzilla.redhat.com/show_bug.cgi?id=2337620
https://github.com/advisories/GHSA-qr6x-62gq-4ccp
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2025-02-01 00:20:29
  • Multiple Updates
2025-01-30 21:20:31
  • First insertion