{"vulnerability": "CVE-2021-25931", "sightings": [{"uuid": "48d68e8e-148b-45be-80ac-71bed25cd416", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-25931", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14174", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2021-25931\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.0-1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to CSRF, due to no CSRF protection at `/opennms/admin/userGroupView/users/updateUser`. This flaw allows assigning `ROLE_ADMIN` security role to a normal user. Using this flaw, an attacker can trick the admin user to assign administrator privileges to a normal user by enticing him to click upon an attacker-controlled website.\n\ud83d\udccf Published: 2021-05-20T14:54:36.000Z\n\ud83d\udccf Modified: 2025-04-30T20:22:38.164Z\n\ud83d\udd17 References:\n1. https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84\n2. https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c\n3. https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25931", "creation_timestamp": "2025-04-30T21:15:40.000000Z"}]}