CVE-2025-7044
BaseFortify
Publication date: 2025-12-03
Last updated on: 2025-12-18
Assigner: Canonical Ltd.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| canonical | maas | From 3.3.0 (inc) to 3.3.11 (inc) |
| canonical | maas | 3.3.11 |
| canonical | maas | 3.6.2 |
| canonical | maas | 3.7.0 |
| canonical | maas | 3.1 |
| canonical | maas | 3.4.9 |
| canonical | maas | 3.5.9 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-269 | The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Improper Input Validation issue in the user websocket handler of MAAS. An authenticated but unprivileged attacker can intercept a user.update websocket request and inject the is_superuser property set to true. Because the server does not properly validate this input, the attacker can escalate their privileges and gain full administrative control over the MAAS deployment.
How can this vulnerability impact me? :
This vulnerability allows an attacker with limited privileges to escalate their access to full administrative control over the MAAS deployment. This means the attacker can manage, modify, or disrupt the entire system, potentially leading to unauthorized changes, data exposure, or service disruption.