CVE-2025-43712
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-25

Last updated on: 2025-08-04

Assigner: MITRE

Description
JHipster before v.8.9.0 allows privilege escalation via a modified authorities parameter. Upon registering in the JHipster portal and logging in as a standard user, the authorities parameter in the response from the api/account endpoint contains the value ROLE_USER. By manipulating the authorities parameter and changing its value to ROLE_ADMIN, the privilege is successfully escalated to an Admin level. This allowed the access to all admin-related functionalities in the application. NOTE: this is disputed by the Supplier because there is no privilege escalation in the context of the JHipster backend (the report only demonstrates that, after using JHipster to generate an application, one can make a non-functional admin screen visible in the front end of that application).
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-25
Last Modified
2025-08-04
Generated
2026-05-07
AI Q&A
2025-07-25
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
jhipster jhipster *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CWE-451 The user interface (UI) does not properly represent critical information to the user, allowing the information - or its source - to be obscured or spoofed. This is often a component in phishing attacks.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-43712 is a privilege escalation vulnerability in the JHipster platform where an attacker can elevate their permissions from a normal user (ROLE_USER) to an administrator (ROLE_ADMIN) by manipulating the authorities parameter in the response from the /api/account endpoint. The application trusts this client-modified data without proper server-side authorization checks, allowing attackers to impersonate admins and access restricted features. [1]


How can this vulnerability impact me? :

This vulnerability allows an attacker to gain unauthorized admin-level access, enabling them to access all admin-related functionalities such as viewing the full list of registered users, modifying user details including sensitive information like email addresses, potentially leading to account takeover, and performing admin operations like user creation. This can compromise the security and integrity of the application and its users. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring and intercepting the JSON response from the /api/account endpoint after user login. Specifically, check if the 'authorities' parameter in the response can be manipulated from ['ROLE_USER'] to ['ROLE_ADMIN'] and if the application grants admin privileges based on this client-modified data. Network traffic capture tools like curl or intercepting proxies can be used to observe and modify this response. For example, you can use curl to fetch the /api/account endpoint and inspect the authorities field: curl -i -H 'Authorization: Bearer <token>' https://<jhipster-app>/api/account. Then, attempt to modify the authorities value in the response and replay requests to see if admin access is granted. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include enforcing strict server-side authorization checks to validate user roles rather than trusting client-supplied data. Avoid relying on the authorities parameter sent from the client for access control decisions. If possible, upgrade or patch JHipster to a version that enforces proper backend role validation. If no patch is available, implement custom server-side checks to verify user privileges before granting admin access. Additionally, monitor and restrict manipulation of API responses and consider using integrity checks or tokens to prevent client-side tampering. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart