Cyber Posture

CVE-2025-2320

HighPublic PoC

Published: 14 March 2025

Published
14 March 2025
Modified
22 October 2025
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0013 31.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-2320 is a high-severity Incorrect Privilege Assignment (CWE-266) vulnerability in 274056675 Springboot-Openai-Chatgpt. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 31.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

This vulnerability is AI-related — categorised as Enterprise AI Assistants; in the Other ATLAS/OWASP Terms risk domain.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 4 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires systems to enforce approved authorizations for access to resources, directly addressing the improper authorization flaw in the User Handler submit function.

prevent

Restricts specific actions like the vulnerable submit function from being performed without identification or authentication, preventing remote unauthorized manipulation.

prevent

Limits the privileges of processes handling API requests to minimize the impact of authorization bypasses in the springboot-openai-chatgpt application.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1136 Create Account Persistence
Adversaries may create an account to maintain access to victim systems.
T1136.001 Local Account Persistence
Adversaries may create a local account to maintain access to victim systems.
T1078 Valid Accounts Stealth
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
T1078.003 Local Accounts Stealth
Adversaries may obtain and abuse credentials of a local account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Why these techniques?

Improper authorization in user submit API allows logged-in users to create super administrator accounts without checks, enabling exploitation for privilege escalation (T1068), unauthorized account creation (T1136/T1136.001), and subsequent use of valid local accounts (T1078/T1078.003).

NVD Description

A vulnerability has been found in 274056675 springboot-openai-chatgpt e84f6f5 and classified as critical. Affected by this vulnerability is the function submit of the file /api/blade-user/submit of the component User Handler. The manipulation leads to improper authorization. The attack can be…

more

launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.

Deeper analysisAI

CVE-2025-2320 is a critical improper authorization vulnerability (CWE-266, CWE-285) affecting the submit function in the /api/blade-user/submit file of the User Handler component within the springboot-openai-chatgpt application at commit e84f6f5, developed by 274056675. The issue allows manipulation leading to improper authorization and has a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).

Remote attackers require no privileges or user interaction and face low attack complexity to exploit the vulnerability. Successful exploitation can result in low-level impacts to confidentiality, integrity, and availability.

VulDB advisories note that the exploit has been publicly disclosed and may be used. The product employs rolling releases for continuous delivery, so details on affected and updated versions are unavailable. The vendor was contacted early regarding the disclosure but provided no response.

Details

CWE(s)

Affected Products

274056675
springboot-openai-chatgpt
2024-12-29

AI Security AnalysisAI

AI Category
Enterprise AI Assistants
Risk Domain
Other ATLAS/OWASP Terms
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
The affected software is 'springboot-openai-chatgpt', a Spring Boot application integrating OpenAI ChatGPT for chat functionality, with user management APIs, fitting the profile of an enterprise AI assistant.

CVEs Like This One

CVE-2025-2334Same product: 274056675 Springboot-Openai-Chatgpt
CVE-2025-2322Same product: 274056675 Springboot-Openai-Chatgpt
CVE-2025-8261Shared CWE-266, CWE-285
CVE-2026-2076Shared CWE-266, CWE-285
CVE-2026-2079Shared CWE-266, CWE-285
CVE-2026-0574Shared CWE-266, CWE-285
CVE-2026-2106Shared CWE-266, CWE-285
CVE-2026-2077Shared CWE-266, CWE-285
CVE-2026-4990Shared CWE-266, CWE-285
CVE-2025-10390Shared CWE-266, CWE-285

References