CVE-2025-67793

Source
https://cve.org/CVERecord?id=CVE-2025-67793
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-67793.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-67793
Published
2025-12-17T21:16:16.443Z
Modified
2026-03-13T03:42:15.380419Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in DriveLock 24.1 through 24.1., 24.2 through 24.2., and 25.1 before 25.1.6. Users with the "Manage roles and permissions" privilege can promote themselves or other DOC users to the Supervisor role through an API call. This privilege is included by default in the Administrator role. This issue mainly affects cloud multi-tenant deployments; on-prem single-tenant installations are typically not impacted because local admins usually already have Supervisor privileges.

References

Affected packages

Git /

Affected ranges

Database specific

unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "24.1"
            },
            {
                "last_affected": "24.1.6"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "24.2"
            },
            {
                "last_affected": "24.2.8"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "25.1"
            },
            {
                "fixed": "25.1.6"
            }
        ]
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-67793.json"