Home

Description

ServiceNow has addressed a Broken Access Control vulnerability that was identified in the ServiceNow AI Platform. This vulnerability could allow a low privileged user to bypass access controls and perform a limited set of actions typically reserved for higher privileged users, potentially leading to unauthorized data modifications. This issue is addressed in the listed patches and family releases, which have been made available to hosted and self-hosted customers, as well as partners.

PUBLISHED Reserved 2025-04-01 | Published 2025-08-12 | Updated 2025-08-12 | Assigner SN




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-639 Authorization Bypass Through User-Controlled Key

Product status

Default status
unaffected

Aspen before Washington DC Patch 10 Hot Fix 2a
affected

Aspen before Xanadu Patch 7a
affected

Aspen before Xanadu Patch 8
affected

Aspen before Yokohama Patch 1a
affected

Aspen before Yokohama Patch 2
affected

Aspen before Zurich (EA)
affected

Credits

Doukani Mohammed Adam finder

References

support.servicenow.com/...cle_view&sysparm_article=KB2264930

cve.org (CVE-2025-3089)

nvd.nist.gov (CVE-2025-3089)

Download JSON