Improperly Controlled Modification of Dynamically-Determined Object Attributes Affecting camaleon_cms package, versions <2.9.1


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improperly Controlled Modification of Dynamically-Determined Object Attributes vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUBY-CAMALEONCMS-9460795
  • published17 Mar 2025
  • disclosed14 Mar 2025
  • creditJoshua Martinelle

Introduced: 14 Mar 2025

NewCVE-2025-2304  (opens in a new tab)
CWE-915  (opens in a new tab)

How to fix?

Upgrade camaleon_cms to version 2.9.1 or higher.

Overview

camaleon_cms is a dynamic and advanced content management system based on Ruby on Rails as an alternative to Wordpress.

Affected versions of this package are vulnerable to Improperly Controlled Modification of Dynamically-Determined Object Attributes via the updated_ajax method of the UsersController due to using the dangerous permit! method, which allows all parameters to pass through without any filtering. An attacker can escalate privileges by exploiting the unsafe handling of parameter permissions.

CVSS Base Scores

version 4.0
version 3.1