Privilege escalation in Camaleon CMS



Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2025-2304
CWE-ID CWE-264
Exploitation vector Network
Public exploit N/A
Vulnerable software
Camaleon CMS
Web applications / CMS

Vendor Owen Peredo Diaz

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU105805

Risk: Medium

CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2025-2304

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to use of the dangerous permit! method, which allows all parameters to pass through without any filtering, leading to security restrictions bypass and privilege escalation.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Camaleon CMS: 2.0.0 - 2.9.0

CPE2.3 External links

https://github.com/owen2345/camaleon-cms
https://www.tenable.com/security/research/tra-2025-09


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###