We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-3089

Broken Access Control in ServiceNow AI Platform



Description

ServiceNow has addressed a Broken Access Control vulnerability that was identified in the ServiceNow AI Platform. This vulnerability could allow a low privileged user to bypass access controls and perform a limited set of actions typically reserved for higher privileged users, potentially leading to unauthorized data modifications. This issue is addressed in the listed patches and family releases, which have been made available to hosted and self-hosted customers, as well as partners.

Reserved 2025-04-01 | Published 2025-08-12 | Updated 2025-08-12 | Assigner SN


MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-639 Authorization Bypass Through User-Controlled Key

Product status

Default status
unaffected

Aspen before Washington DC Patch 10 Hot Fix 2a
affected

Aspen before Xanadu Patch 7a
affected

Aspen before Xanadu Patch 8
affected

Aspen before Yokohama Patch 1a
affected

Aspen before Yokohama Patch 2
affected

Aspen before Zurich (EA)
affected

Credits

Doukani Mohammed Adam finder

References

support.servicenow.com/...cle_view&sysparm_article=KB2264930

cve.org (CVE-2025-3089)

nvd.nist.gov (CVE-2025-3089)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-3089

Support options

Helpdesk Chat, Email, Knowledgebase