fkie_cve-2025-4649
Vulnerability from fkie_nvd
Published
2025-05-13 12:15
Modified
2025-10-15 13:16
Severity ?
Summary
Improper Handling of Exceptional Conditions vulnerability in Centreon web allows Privilege Escalation.
ACL are not correctly taken into account in the display of the "event logs" page. This page requiring, high privileges, will display all available logs.
This issue affects web: from 24.10.3 before 24.10.4, from 24.04.09 before 24.04.10, from 23.10.19 before 23.10.21, from 23.04.24 before 23.04.26.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Handling of Exceptional Conditions vulnerability in Centreon web allows Privilege Escalation.\n\n\n\nACL are not correctly taken into account in the display of the \"event logs\" page. This page requiring, high privileges, will display all available logs.\nThis issue affects web: from 24.10.3 before 24.10.4, from 24.04.09 before 24.04.10, from 23.10.19 before 23.10.21, from 23.04.24 before 23.04.26." }, { "lang": "es", "value": "Una vulnerabilidad de gesti\u00f3n incorrecta de privilegios en la web de Centreon permite la escalada de privilegios. Las ACL no se tienen en cuenta correctamente al mostrar la p\u00e1gina \"event logs\". Esta p\u00e1gina, que requiere privilegios elevados, mostrar\u00e1 todos los registros disponibles. Este problema afecta a la web: desde la versi\u00f3n 24.10.3 hasta la 24.10.4, desde la versi\u00f3n 24.04.09 hasta la 24.04.10, desde la versi\u00f3n 23.10.19 hasta la 23.10.21, desde la versi\u00f3n 23.04.24 hasta la 23.04.26." } ], "id": "CVE-2025-4649", "lastModified": "2025-10-15T13:16:01.767", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "bd4443e6-1eef-43f3-9886-25fc9ceeaae7", "type": "Secondary" } ] }, "published": "2025-05-13T12:15:18.047", "references": [ { "source": "bd4443e6-1eef-43f3-9886-25fc9ceeaae7", "url": "https://github.com/centreon/centreon/releases" }, { "source": "bd4443e6-1eef-43f3-9886-25fc9ceeaae7", "url": "https://thewatch.centreon.com/latest-security-bulletins-64/centreon-web-medium-severity-4349" } ], "sourceIdentifier": "bd4443e6-1eef-43f3-9886-25fc9ceeaae7", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-755" } ], "source": "bd4443e6-1eef-43f3-9886-25fc9ceeaae7", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…