8.8
CVE-2025-21611
- EPSS 0.39%
- Veröffentlicht 06.01.2025 16:15:31
- Zuletzt bearbeitet 19.08.2025 13:17:13
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
tgstation-server is a production scale tool for BYOND server management. Prior to 6.12.3, roles used to authorize API methods were incorrectly OR'd instead of AND'ed with the role used to determine if a user was enabled. This allows enabled users access to most, but not all, authorized actions regardless of their permissions. Notably, the WriteUsers right is unaffected so users may not use this bug to permanently elevate their account permissions. The fix is release in tgstation-server-v6.12.3.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Tgstation13 ≫ Tgstation-server Version >= 6.11.0 < 6.12.3
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.39% | 0.596 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security-advisories@github.com | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-285 Improper Authorization
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.