{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-8261","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-07-26T16:14:28.085Z","datePublished":"2025-07-28T06:32:05.645Z","dateUpdated":"2026-04-15T07:13:54.724Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-04-15T07:13:54.724Z"},"title":"Vaelsys VaelsysV4 User Creation vgrid_server.php improper authorization","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-285","lang":"en","description":"Improper Authorization"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-266","lang":"en","description":"Incorrect Privilege Assignment"}]}],"affected":[{"vendor":"Vaelsys","product":"VaelsysV4","versions":[{"version":"4.1.0","status":"affected"}],"modules":["User Creation Handler"]}],"descriptions":[{"lang":"en","value":"A weakness has been identified in Vaelsys VaelsysV4 4.1.0. This vulnerability affects unknown code of the file /grid/vgrid_server.php of the component User Creation Handler. Executing a manipulation can lead to improper authorization. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. The real existence of this vulnerability is still doubted at the moment. The vendor explains: \"Based on Vaelsys' analysis, the reported behavior does not allow actions beyond those already permitted to authenticated administrative users, and no change in system configuration or operational practices is necessary.\""}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-07-26T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-03-20T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-04-15T09:18:46.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"waiwai24 (VulDB User)","type":"reporter"},{"lang":"en","value":"security_vaelsys (VulDB User)","type":"analyst"},{"lang":"en","value":"VulDB CNA Team","type":"coordinator"}],"references":[{"url":"https://vuldb.com/vuln/317849","name":"VDB-317849 | Vaelsys VaelsysV4 User Creation vgrid_server.php improper authorization","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/317849/cti","name":"VDB-317849 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/616924","name":"Submit #616924 | Vaelsys Vaelsys V4 v4.1.0  Unauthorized User Creation Vulnerability","tags":["third-party-advisory"]},{"url":"https://github.com/waiwai24/0101/blob/main/CVEs/Vaelsys/Unauthorized_User_Creation_Vulnerability_Exists_in_Vaelsys_V4_Platform.md","tags":["exploit"]},{"url":"https://vaelsys.github.io/security-advisory/advisories/VSEC_V4_2025_07_0003.html","tags":["related"]}],"tags":["disputed"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-07-28T15:51:54.071080Z","id":"CVE-2025-8261","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-28T15:53:54.833Z"}}]}}