Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 19 Dec 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:terminalfour:terminalfour:*:*:*:*:*:*:*:* |
Wed, 03 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-285 | |
| Metrics |
cvssV3_1
|
Wed, 03 Dec 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Terminalfour
Terminalfour terminalfour |
|
| Vendors & Products |
Terminalfour
Terminalfour terminalfour |
Tue, 02 Dec 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Terminalfour 8 through 8.4.1.1, the userLevel parameter in the user management function is not subject to proper server-side authorization checks. A Power User can intercept and modify this parameter to assign the Administrator role to other existing lower-privileged accounts, or invite a new lower-privileged account and escalate its privileges. While manipulating this request, the Power User can also change the target account's password, effectively taking full control of it. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-03T15:13:08.720Z
Reserved: 2025-08-29T00:00:00.000Z
Link: CVE-2025-58386
Updated: 2025-12-03T15:12:33.824Z
Status : Analyzed
Published: 2025-12-02T18:15:48.007
Modified: 2025-12-19T18:27:13.727
Link: CVE-2025-58386
No data.
OpenCVE Enrichment
Updated: 2025-12-03T12:09:49Z