CVE-2025-5409

| EUVD-2025-16588 HIGH
2025-06-01 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

5
Analysis Generated
Mar 14, 2026 - 16:42 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 16:42 euvd
EUVD-2025-16588
Patch Released
Mar 14, 2026 - 16:42 nvd
Patch available
PoC Detected
Nov 25, 2025 - 14:58 vuln.today
Public exploit code
CVE Published
Jun 01, 2025 - 22:15 nvd
HIGH 7.3

Description

A vulnerability was found in Mist Community Edition up to 4.7.1. It has been classified as critical. This affects the function create_token of the file src/mist/api/auth/views.py of the component API Token Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.7.2 is able to address this issue. The identifier of the patch is db10ecb62ac832c1ed4924556d167efb9bc07fad. It is recommended to upgrade the affected component.

Analysis

Critical improper access control vulnerability in Mist Community Edition's API Token Handler (create_token function) that allows unauthenticated remote attackers to manipulate token generation. Affected versions up to 4.7.1 are vulnerable; the vulnerability has been publicly disclosed with exploitation techniques available, and upgrading to version 4.7.2 provides the necessary fix. The CVSS 7.3 score reflects medium-to-high severity with potential for confidentiality, integrity, and availability impact.

Technical Context

The vulnerability exists in src/mist/api/auth/views.py within the create_token function of Mist Community Edition's REST API authentication layer. The root cause is classified as CWE-266 (Improper Privilege Management), indicating that the token creation endpoint fails to properly enforce access controls or privilege boundaries before issuing API tokens. This suggests attackers can bypass authentication or authorization checks during token generation, potentially allowing them to obtain tokens with elevated privileges or create tokens on behalf of other users. The affected component is part of the API authentication framework, making this a critical control point in the application's security posture. CPE context: cpe:2.3:a:mist:mist_community_edition:*:*:*:*:*:*:*:* (versions <= 4.7.1).

Affected Products

- product: Mist Community Edition; vendor: Mist; affected_versions: up to and including 4.7.1; vulnerable_component: src/mist/api/auth/views.py - create_token function; patched_version: 4.7.2; patch_identifier: db10ecb62ac832c1ed4924556d167efb9bc07fad

Remediation

- action: Immediate Upgrade; details: Upgrade Mist Community Edition to version 4.7.2 or later. Patch commit db10ecb62ac832c1ed4924556d167efb9bc07fad addresses the improper access control in the create_token function. - action: Interim Mitigation (if upgrade delayed); details: Implement network-level access controls restricting access to the API token endpoint (typically /api/auth/token or similar) to trusted networks. Consider implementing rate limiting and monitoring for abnormal token creation patterns. Review audit logs for unauthorized token creation attempts. - action: Post-Patch Verification; details: After upgrading to 4.7.2, audit all API tokens for unauthorized or suspicious creation timestamps. Revoke any tokens created during the vulnerability window. Rotate credentials for service accounts that may have been compromised. - action: Monitoring; details: Implement logging and alerting on the /api/auth/token endpoint for: (1) Failed authentication attempts, (2) Token creation without proper authorization context, (3) Unusual token creation rates, (4) Tokens created for unexpected user accounts or service principals.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +36
POC: +20

Share

CVE-2025-5409 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy