CVE-2025-13084

7.6 HIGH

📋 TL;DR

The groov View API users endpoint exposes API keys for all users, including administrators, to anyone with Editor role access. This allows privilege escalation and unauthorized access to sensitive systems. Organizations using affected groov View versions are vulnerable.

💻 Affected Systems

Products:
  • Opto 22 groov View
Versions: All versions prior to 4.0.0
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects groov View installations with API enabled and users with Editor roles.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative API keys, enabling full system compromise, data exfiltration, and operational disruption of industrial control systems.

🟠

Likely Case

Insiders or attackers with Editor access steal API keys to escalate privileges, access restricted data, or manipulate system configurations.

🟢

If Mitigated

With proper network segmentation and role-based access controls, impact is limited to authorized users within isolated environments.

🌐 Internet-Facing: HIGH if exposed to internet, as attackers could exploit Editor credentials to access all API keys.
🏢 Internal Only: MEDIUM in isolated networks, but still enables insider threats and lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires Editor role credentials; exploitation is simple via API calls.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.0.0

Vendor Advisory: https://www.opto22.com/support/resources-tools/knowledgebase/kb91325

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download groov View 4.0.0 from Opto 22 support portal. 3. Install update following vendor instructions. 4. Restart groov View service.

🔧 Temporary Workarounds

Restrict API Access

all

Limit network access to groov View API to trusted IPs only.

Configure firewall rules to restrict TCP port 443 (HTTPS) to authorized management networks.

Minimize Editor Roles

all

Reduce number of users with Editor role to essential personnel only.

Review and modify user roles in groov View administration panel.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate groov View from untrusted networks.
  • Monitor API access logs for unusual patterns and implement alerting for users endpoint access.

🔍 How to Verify

Check if Vulnerable:

Authenticate as Editor role user and query /api/users endpoint; if API keys are returned in response, system is vulnerable.

Check Version:

Check groov View version in administration panel or via system info API endpoint.

Verify Fix Applied:

After updating to 4.0.0, verify /api/users endpoint no longer returns API keys in response data.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to /api/users endpoint
  • Multiple failed authentication attempts followed by successful Editor login

Network Indicators:

  • HTTP GET requests to /api/users from unexpected IP addresses
  • Increased API traffic from single source

SIEM Query:

source="groov_view" AND uri_path="/api/users" AND http_method="GET" | stats count by src_ip

🔗 References

📤 Share & Export