CVE-2024-25632

Unauthorised granting of administrator privileges over arbitrary teams under certain circumstances

Description

eLabFTW is an open source electronic lab notebook for research labs. In the context of eLabFTW, an administrator is a user account with certain privileges to manage users and content in their assigned team/teams. A user may be an administrator in one team and a regular user in another. The vulnerability allows a regular user to become administrator of a team where they are a member, under a reasonable configuration. Additionally, in eLabFTW versions subsequent to v5.0.0, the vulnerability may allow an initially unauthenticated user to gain administrative privileges over an arbitrary team. The vulnerability does not affect system administrator status. Users should upgrade to version 5.1.0. System administrators are advised to turn off local user registration, saml_team_create and not allow administrators to import users into teams, unless strictly required.

Category

8.6
CVSS
Severity: High
CVSS 3.1 •
EPSS 0.12%
Affected: elabftw elabftw
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-25632?
CVE-2024-25632 has been scored as a high severity vulnerability.
How to fix CVE-2024-25632?
To fix CVE-2024-25632, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2024-25632 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-25632 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-25632?
CVE-2024-25632 affects elabftw elabftw.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.