{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-5409","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-05-31T16:51:07.351Z","datePublished":"2025-06-01T22:00:16.052Z","dateUpdated":"2025-06-02T03:38:52.683Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-06-01T22:00:16.052Z"},"title":"Mist Community Edition API Token views.py create_token access control","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-284","lang":"en","description":"Improper Access Controls"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-266","lang":"en","description":"Incorrect Privilege Assignment"}]}],"affected":[{"vendor":"Mist","product":"Community Edition","versions":[{"version":"4.7.0","status":"affected"},{"version":"4.7.1","status":"affected"}],"modules":["API Token Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Mist Community Edition up to 4.7.1. It has been classified as critical. This affects the function create_token of the file src/mist/api/auth/views.py of the component API Token Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.7.2 is able to address this issue. The identifier of the patch is db10ecb62ac832c1ed4924556d167efb9bc07fad. It is recommended to upgrade the affected component."},{"lang":"de","value":"Es wurde eine Schwachstelle in Mist Community Edition bis 4.7.1 ausgemacht. Sie wurde als kritisch eingestuft. Betroffen hiervon ist die Funktion create_token der Datei src/mist/api/auth/views.py der Komponente API Token Handler. Durch Beeinflussen mit unbekannten Daten kann eine improper access controls-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung. Ein Aktualisieren auf die Version 4.7.2 vermag dieses Problem zu lösen. Der Patch wird als db10ecb62ac832c1ed4924556d167efb9bc07fad bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}}],"timeline":[{"time":"2025-05-31T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-05-31T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-06-01T05:41:43.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Alex Perrakis","type":"finder"},{"lang":"en","value":"Efstratios Chatzoglou","type":"finder"},{"lang":"en","value":"Georgios Kambourakis","type":"finder"},{"lang":"en","value":"alexperrakis (VulDB User)","type":"reporter"},{"lang":"en","value":"alexperrakis (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.310749","name":"VDB-310749 | Mist Community Edition API Token views.py create_token access control","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.310749","name":"VDB-310749 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.583531","name":"Submit #583531 | Mist.io Mist Community Edition (CE) 4.7.1 Improper Access Controls","tags":["third-party-advisory"]},{"url":"https://github.com/Stolichnayer/mist-ce-account-takeover","tags":["exploit"]},{"url":"https://github.com/mistio/mist.api/commit/db10ecb62ac832c1ed4924556d167efb9bc07fad","tags":["patch"]},{"url":"https://github.com/mistio/mist-ce/releases/tag/v4.7.2","tags":["patch"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-02T03:38:38.653621Z","id":"CVE-2025-5409","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-02T03:38:52.683Z"}}]}}