CVE-2025-70997
Published: 04 February 2026
Summary
CVE-2025-70997 is a medium-severity Incorrect Authorization (CWE-863) vulnerability in Eladmin Eladmin. Its CVSS base score is 6.5 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 2.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
The access control policy and procedures directly mandate and enforce proper access control mechanisms across the organization.
Supervision and review of access control activities directly detects and remediates improper access configurations or usages.
Associating and retaining security attributes with data directly supports enforcement of access control decisions across storage, processing, and transmission.
Requiring prior authorization for each remote access type prevents improper access control over remote connections.
Requiring authorization of wireless access before allowing connections enforces proper access control for this access method.
Requiring authorization and configuration controls for mobile device connections directly enforces access control and prevents unauthorized devices from reaching organizational systems.
Defining account types, requiring approvals for creation, specifying authorizations, monitoring usage, and reviewing accounts directly prevents improper access control by ensuring only authorized accounts exist and are used.
Enforces rules governing access to the system and its data from external systems based on established trust relationships.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability in public-facing web app enables unauthenticated password reset (account manipulation) leading to unauthorized access.
NVD Description
A vulnerability has been discovered in eladmin v2.7 and before. This vulnerability allows for an arbitrary user password reset under any user permission level.
Deeper analysisAI
CVE-2025-70997 is a vulnerability affecting eladmin versions 2.7 and earlier. It enables arbitrary user password resets regardless of the attacker's permission level, stemming from improper access control and incorrect authorization issues classified under CWE-863 and CWE-284. The vulnerability carries a CVSS v3.1 base score of 6.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N), indicating medium severity with network accessibility, low attack complexity, no privileges or user interaction required, and limited impacts on confidentiality and integrity.
An unauthenticated remote attacker can exploit this vulnerability over the network with minimal effort. By leveraging the flaw, the attacker can reset the password of any user account, potentially gaining unauthorized access to that account and escalating privileges if targeting administrative users.
For mitigation details, refer to the advisories and resources at the eladmin GitHub repository (https://github.com/elunez/eladmin) and the related CVE issue tracker (https://github.com/fofo137/CVE/issues/1), which may include patches or workarounds for affected versions. The vulnerability was published on 2026-02-04.
Details
- CWE(s)