CVE-2025-52166
BaseFortify
Publication date: 2025-07-18
Last updated on: 2025-07-22
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| agorum | core_open | 11.9.2 |
| agorum | core_open | 11.10.1 |
| agorum | core_open | 1.9.1.3-1857 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Incorrect Authorization issue in Agorum Core Open software versions prior to 11.9.2 and 11.10.1. It allows authenticated users with low privileges to bypass access controls and perform administrative actions without proper authorization. This includes accessing sensitive endpoints to download server logs and stack traces, mass deleting files, modifying access rights, and other administrative functions. Additionally, immediately after installation, some endpoints are accessible without any authentication, exposing sensitive information and functionality. [1]
How can this vulnerability impact me? :
The vulnerability can allow attackers with low-level access to escalate their privileges to Administrator level, enabling them to access sensitive information, manipulate or delete files, and perform unauthorized administrative actions. This can lead to data breaches, loss of data integrity, disruption of services, and exposure of sensitive system information such as logs and stack traces. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking if low-privileged users can access administrative endpoints without proper authorization. You can test access to the following endpoints to see if they are accessible without admin privileges or authentication: - /roiwebui/address_module/tools/ReindexAddressContainers.jsp - /roiwebui/roiprotocols_module/tools/SendMailFromMailbox.jsp - /roiwebui/roiwebui_module/tools/DownloadLog.jsp - /roiwebui/roiwebui_module/tools/Stacktrace.jsp - /roiwebui/roiwebui_module/tools/Stacktrace2.jsp - /roiwebui/roiwebui_module/tools/PrintIndexJson.jsp - /roiwebui/roiwebui_module/tools/MassDelete.jsp - /roiwebui/roiwebui_module/tools/ScopeAclTool.jsp - /roiwebui/roiwebui_module/tools/TestPerformance.jsp For example, you can use curl commands to test access: curl -i http://<target>/roiwebui/roiwebui_module/tools/DownloadLog.jsp If these endpoints are accessible without admin privileges or authentication, the system is vulnerable. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include upgrading the Agorum Core Open software to fixed versions 11.9.2 or 11.10.1, which contain the necessary access control fixes. If upgrading is not immediately possible, you should manually add or adjust access control checks in the affected .jsp files by verifying that the sessionController is not null and that the user has admin privileges, using code like: if (sessionController != null && sessionController.isAdminEnabled()) { ... } Additionally, restrict access to the vulnerable endpoints and ensure that no endpoints are accessible without authentication, especially after fresh installations. [1]