Home

Description

OpenBMCS 2.4 allows an attacker to escalate privileges from a read user to an admin user by manipulating permissions and exploiting a vulnerability in the update_user_permissions.php script. Attackers can submit a malicious HTTP POST request to PHP scripts in '/plugins/useradmin/' directory.

PUBLISHED Reserved 2025-12-05 | Published 2025-12-09 | Updated 2025-12-09 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-862: Missing Authorization

Product status

Default status
unaffected

2.4
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.exploit-db.com/exploits/50669 (ExploitDB-50669) exploit

www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5693.php (Zero Science Lab Disclosure (ZSL-2022-5693)) third-party-advisory

www.vulncheck.com/...cs-user-management-privilege-escalation (VulnCheck Advisory: OpenBMCS User Management Privilege Escalation) third-party-advisory

cve.org (CVE-2021-47701)

nvd.nist.gov (CVE-2021-47701)

Download JSON