Skip to content

Commit 2e1e799

Browse files
jasnowpostmodern
authored andcommitted
GHSA SYNC: 1 brand new advisory
1 parent cb566ac commit 2e1e799

File tree

1 file changed

+25
-0
lines changed

1 file changed

+25
-0
lines changed

gems/camaleon_cms/CVE-2025-2304.yml

+25
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
---
2+
gem: camaleon_cms
3+
cve: 2025-2304
4+
ghsa: rp28-mvq3-wf8j
5+
url: https://github.com/advisories/GHSA-rp28-mvq3-wf8j
6+
title: Camaleon CMS Vulnerable to Privilege Escalation through a Mass Assignment
7+
date: 2025-03-14
8+
description: |
9+
A Privilege Escalation through a Mass Assignment exists in Camaleon CMS
10+
11+
When a user wishes to change his password, the 'updated_ajax' method
12+
of the UsersController is called. The vulnerability stems from the
13+
use of the dangerous permit! method, which allows all parameters to
14+
pass through without any filtering.
15+
cvss_v4: 9.4
16+
patched_versions:
17+
- ">= 2.9.1"
18+
related:
19+
url:
20+
- https://nvd.nist.gov/vuln/detail/CVE-2025-2304
21+
- https://www.tenable.com/security/research/tra-2025-09
22+
- https://github.com/owen2345/camaleon-cms/pull/1109
23+
- https://github.com/owen2345/camaleon-cms/commit/179fd6b1ecf258d3e214aebfa87ac4a322ea4db4
24+
- https://github.com/owen2345/camaleon-cms/releases/tag/2.9.1
25+
- https://github.com/advisories/GHSA-rp28-mvq3-wf8j

0 commit comments

Comments
 (0)