Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://bugs.launchpad.net/maas/+bug/2115714 |
|
Thu, 18 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:canonical:maas:*:*:*:*:*:*:*:* |
Thu, 04 Dec 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Canonical
Canonical maas |
|
| Vendors & Products |
Canonical
Canonical maas |
Wed, 03 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 03 Dec 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An Improper Input Validation vulnerability exists in the user websocket handler of MAAS. An authenticated, unprivileged attacker can intercept a user.update websocket request and inject the is_superuser property set to true. The server improperly validates this input, allowing the attacker to self-promote to an administrator role. This results in full administrative control over the MAAS deployment. | |
| Title | Privilege Escalation in MAAS via Websocket Request Manipulation | |
| Weaknesses | CWE-269 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2025-12-03T16:42:52.179Z
Reserved: 2025-07-03T08:57:34.048Z
Link: CVE-2025-7044
Updated: 2025-12-03T16:42:48.167Z
Status : Analyzed
Published: 2025-12-03T16:16:00.450
Modified: 2025-12-18T21:01:26.960
Link: CVE-2025-7044
No data.
OpenCVE Enrichment
Updated: 2025-12-04T16:44:08Z