CVE-2025-58052

Source
https://cve.org/CVERecord?id=CVE-2025-58052
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-58052.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-58052
Aliases
  • GHSA-gp9g-gf56-fcxx
Downstream
Published
2025-12-19T16:24:10.982Z
Modified
2026-01-07T14:47:49.787273Z
Severity
  • 2.1 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P CVSS Calculator
Summary
Galette has groups managers access control bypass on Members
Details

Galette is a membership management web application for non profit organizations. Starting in version 0.9.6 and prior to version 1.2.0, attackers with group manager role can bypass intended restrictions allowing unauthorized access and changes despite role-based controls. Since it requires privileged access initially, exploitation is restricted to malicious insiders or compromised group managers accounts. Version 1.2.0 fixes the issue.

Database specific
{
    "cwe_ids": [
        "CWE-863"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/58xxx/CVE-2025-58052.json"
}
References

Affected packages

Git / github.com/galette/galette

Affected ranges

Type
GIT
Repo
https://github.com/galette/galette
Events

Affected versions

0.*
0.9.6
0.9.6.1
1.*
1.0.0
1.0.0rc1
1.0.0rc2
1.0.0rc3
1.1.0
1.1.0-rc1
1.1.0-rc2
1.1.1
1.1.2
1.1.3
1.1.4
1.1.5
1.1.5.1
1.1.5.2
1.2.0-alpha

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-58052.json"