CVE-2025-26372
Published: 12 February 2025
Summary
CVE-2025-26372 is a high-severity Missing Authorization (CWE-862) vulnerability in Q-Free Maxtime. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 36.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
AC-3 enforces approved authorizations for access to system resources, directly addressing the missing authorization that allows low-privileged users to remove users from groups.
AC-6 applies least privilege to restrict low-privileged users from performing unauthorized administrative actions like modifying group memberships.
AC-2 manages accounts and group memberships to ensure only authorized personnel can modify access controls, mitigating unauthorized changes.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability allows exploitation of a public-facing web application (T1190) by low-privileged authenticated attackers to remove users from groups, enabling account access removal (T1531) and revocation of access rights.
NVD Description
A CWE-862 "Missing Authorization" in maxprofile/user-groups/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated (low-privileged) attacker to remove users from groups via crafted HTTP requests.
Deeper analysisAI
CVE-2025-26372 is a CWE-862 missing authorization vulnerability in the maxprofile/user-groups/routes.lua component of Q-Free MaxTime versions less than or equal to 2.11.0. Published on 2025-02-12, the issue has a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L). It enables an authenticated low-privileged attacker to remove users from groups through crafted HTTP requests.
A low-privileged authenticated attacker can exploit this vulnerability remotely over the network with low attack complexity and no user interaction. Exploitation allows the attacker to remove arbitrary users from groups, leading to high integrity impact by unauthorized modification of access controls and low availability impact.
Mitigation details are available in the advisory from Nozomi Networks at https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26372.
Details
- CWE(s)