CVE-2025-21611

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-21611
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-21611.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-21611
Aliases
  • GHSA-rf5r-q276-vrc4
Published
2025-01-06T15:38:20Z
Modified
2025-11-13T19:49:58.399958Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
tgstation-server's role authorization incorrectly OR'd with user's enabled status
Details

tgstation-server is a production scale tool for BYOND server management. Prior to 6.12.3, roles used to authorize API methods were incorrectly OR'd instead of AND'ed with the role used to determine if a user was enabled. This allows enabled users access to most, but not all, authorized actions regardless of their permissions. Notably, the WriteUsers right is unaffected so users may not use this bug to permanently elevate their account permissions. The fix is release in tgstation-server-v6.12.3.

Database specific
{
    "cwe_ids": [
        "CWE-285"
    ]
}
References

Affected packages

Git / github.com/tgstation/tgstation-server

Affected ranges

Type
GIT
Repo
https://github.com/tgstation/tgstation-server
Events

Affected versions

api-v10.*

api-v10.11.0
api-v10.12.0

graphql-v0.*

graphql-v0.3.0
graphql-v0.4.0
graphql-v0.5.0

tgstation-server-v6.*

tgstation-server-v6.11.0
tgstation-server-v6.11.1
tgstation-server-v6.11.2
tgstation-server-v6.11.3
tgstation-server-v6.11.4
tgstation-server-v6.12.0
tgstation-server-v6.12.1
tgstation-server-v6.12.2