Cyber Posture

CVE-2025-70997

MediumPublic PoC

Published: 04 February 2026

Published
04 February 2026
Modified
12 February 2026
KEV Added
Patch
CVSS Score 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
EPSS Score 0.0001 2.9th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-70997 is a medium-severity Incorrect Authorization (CWE-863) vulnerability in Eladmin Eladmin. Its CVSS base score is 6.5 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 2.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-284 CWE-863

The access control policy and procedures directly mandate and enforce proper access control mechanisms across the organization.

addresses: CWE-284 CWE-863

Supervision and review of access control activities directly detects and remediates improper access configurations or usages.

addresses: CWE-284 CWE-863

Associating and retaining security attributes with data directly supports enforcement of access control decisions across storage, processing, and transmission.

addresses: CWE-284 CWE-863

Requiring prior authorization for each remote access type prevents improper access control over remote connections.

addresses: CWE-284 CWE-863

Requiring authorization of wireless access before allowing connections enforces proper access control for this access method.

addresses: CWE-284 CWE-863

Requiring authorization and configuration controls for mobile device connections directly enforces access control and prevents unauthorized devices from reaching organizational systems.

addresses: CWE-284 CWE-863

Defining account types, requiring approvals for creation, specifying authorizations, monitoring usage, and reviewing accounts directly prevents improper access control by ensuring only authorized accounts exist and are used.

addresses: CWE-284 CWE-863

Enforces rules governing access to the system and its data from external systems based on established trust relationships.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1098 Account Manipulation Persistence
Adversaries may manipulate accounts to maintain and/or elevate access to victim systems.
Why these techniques?

Vulnerability in public-facing web app enables unauthenticated password reset (account manipulation) leading to unauthorized access.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability has been discovered in eladmin v2.7 and before. This vulnerability allows for an arbitrary user password reset under any user permission level.

Deeper analysisAI

CVE-2025-70997 is a vulnerability affecting eladmin versions 2.7 and earlier. It enables arbitrary user password resets regardless of the attacker's permission level, stemming from improper access control and incorrect authorization issues classified under CWE-863 and CWE-284. The vulnerability carries a CVSS v3.1 base score of 6.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N), indicating medium severity with network accessibility, low attack complexity, no privileges or user interaction required, and limited impacts on confidentiality and integrity.

An unauthenticated remote attacker can exploit this vulnerability over the network with minimal effort. By leveraging the flaw, the attacker can reset the password of any user account, potentially gaining unauthorized access to that account and escalating privileges if targeting administrative users.

For mitigation details, refer to the advisories and resources at the eladmin GitHub repository (https://github.com/elunez/eladmin) and the related CVE issue tracker (https://github.com/fofo137/CVE/issues/1), which may include patches or workarounds for affected versions. The vulnerability was published on 2026-02-04.

Details

CWE(s)

Affected Products

eladmin
eladmin
≤ 2.7

CVEs Like This One

CVE-2025-2855Same product: Eladmin Eladmin
CVE-2025-22978Same product: Eladmin Eladmin
CVE-2024-57032Shared CWE-284, CWE-863
CVE-2025-22940Shared CWE-284
CVE-2025-27646Shared CWE-284
CVE-2026-25660Shared CWE-863
CVE-2026-24740Shared CWE-284, CWE-863
CVE-2026-33031Shared CWE-284, CWE-863
CVE-2025-25950Shared CWE-284
CVE-2025-66956Shared CWE-284

References