CVE-2025-35431
BaseFortify
Publication date: 2025-09-17
Last updated on: 2025-09-26
Assigner: Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cisa | thorium | From 1.0.0 (inc) to 1.1.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-90 | The product constructs all or part of an LDAP query using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended LDAP query when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs because CISA Thorium does not properly escape user-controlled strings used in LDAP queries. This allows an authenticated remote attacker to manipulate LDAP authorization data, such as modifying group memberships.
How can this vulnerability impact me? :
An attacker who exploits this vulnerability can alter LDAP authorization data, potentially gaining unauthorized access or privileges by changing group memberships. This could lead to unauthorized access to resources or data within the affected system.
What immediate steps should I take to mitigate this vulnerability?
Update CISA Thorium to version 1.1.1 or later, as this version contains the fix for the vulnerability.