CVE-2025-52166
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-18

Last updated on: 2025-07-22

Assigner: MITRE

Description
Incorrect access control in Software GmbH Agorum core open v11.9.2 & v11.10.1 allows authenticated attackers to escalate privileges to Administrator and access sensitive components and information.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-18
Last Modified
2025-07-22
Generated
2026-05-06
AI Q&A
2025-07-18
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
agorum core_open 11.9.2
agorum core_open 11.10.1
agorum core_open 1.9.1.3-1857
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Incorrect Authorization issue in Agorum Core Open software versions prior to 11.9.2 and 11.10.1. It allows authenticated users with low privileges to bypass access controls and perform administrative actions without proper authorization. This includes accessing sensitive endpoints to download server logs and stack traces, mass deleting files, modifying access rights, and other administrative functions. Additionally, immediately after installation, some endpoints are accessible without any authentication, exposing sensitive information and functionality. [1]


How can this vulnerability impact me? :

The vulnerability can allow attackers with low-level access to escalate their privileges to Administrator level, enabling them to access sensitive information, manipulate or delete files, and perform unauthorized administrative actions. This can lead to data breaches, loss of data integrity, disruption of services, and exposure of sensitive system information such as logs and stack traces. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if low-privileged users can access administrative endpoints without proper authorization. You can test access to the following endpoints to see if they are accessible without admin privileges or authentication: - /roiwebui/address_module/tools/ReindexAddressContainers.jsp - /roiwebui/roiprotocols_module/tools/SendMailFromMailbox.jsp - /roiwebui/roiwebui_module/tools/DownloadLog.jsp - /roiwebui/roiwebui_module/tools/Stacktrace.jsp - /roiwebui/roiwebui_module/tools/Stacktrace2.jsp - /roiwebui/roiwebui_module/tools/PrintIndexJson.jsp - /roiwebui/roiwebui_module/tools/MassDelete.jsp - /roiwebui/roiwebui_module/tools/ScopeAclTool.jsp - /roiwebui/roiwebui_module/tools/TestPerformance.jsp For example, you can use curl commands to test access: curl -i http://<target>/roiwebui/roiwebui_module/tools/DownloadLog.jsp If these endpoints are accessible without admin privileges or authentication, the system is vulnerable. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading the Agorum Core Open software to fixed versions 11.9.2 or 11.10.1, which contain the necessary access control fixes. If upgrading is not immediately possible, you should manually add or adjust access control checks in the affected .jsp files by verifying that the sessionController is not null and that the user has admin privileges, using code like: if (sessionController != null && sessionController.isAdminEnabled()) { ... } Additionally, restrict access to the vulnerable endpoints and ensure that no endpoints are accessible without authentication, especially after fresh installations. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart