- Description
- tgstation-server is a production scale tool for BYOND server management. Prior to 6.12.3, roles used to authorize API methods were incorrectly OR'd instead of AND'ed with the role used to determine if a user was enabled. This allows enabled users access to most, but not all, authorized actions regardless of their permissions. Notably, the WriteUsers right is unaffected so users may not use this bug to permanently elevate their account permissions. The fix is release in tgstation-server-v6.12.3.
- Source
- security-advisories@github.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- security-advisories@github.com
- CWE-285
- Hype score
- Not currently trending
CVE-2025-21611 Improper Role Authorization in tgstation-server allows Unauthoriz... https://t.co/NsaZNn734J Customizable Vulnerability Alerts: https://t.co/U7998fz7yk
@VulmonFeeds
6 Jan 2025
18 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-21611: HIGH] Critical security update released for tgstation-server-v6.12.3! Prior versions had a bug allowing unauthorized access for enabled users. Update now to ensure secure server management.#cybersecurity,#vulnerability https://t.co/9Ws6MvPuUh https://t.co/vnoiehp
@CveFindCom
6 Jan 2025
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-21611 tgstation-server is a production scale tool for BYOND server management. Prior to 6.12.3, roles used to authorize API methods were incorrectly OR'd instead of AND'ed … https://t.co/NYjtGuY9Nd
@CVEnew
6 Jan 2025
363 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes