A Privilege Escalation through a Mass Assignment exists in Camaleon CMS
When a user wishes to change his password, the 'updated_ajax' method of the UsersController is called. The vulnerability stems from the use of the dangerous permit! method, which allows all parameters to pass through without any filtering.
{
"nvd_published_at": "2025-03-14T13:15:41Z",
"severity": "CRITICAL",
"github_reviewed_at": "2025-03-17T14:34:48Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-915"
]
}