CVE-2025-14660
📋 TL;DR
This vulnerability in DecoCMS Mesh allows improper access control through manipulation of the domain argument in the createTool function. Attackers can potentially bypass intended restrictions to perform unauthorized actions. Affected users are those running DecoCMS Mesh up to version 1.0.0-alpha.31.
💻 Affected Systems
- DecoCMS Mesh
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Unauthorized users could create tools or perform actions in workspaces they shouldn't have access to, potentially leading to data exposure or privilege escalation.
Likely Case
Limited access control bypass allowing unauthorized tool creation within specific workspace domains.
If Mitigated
With proper network segmentation and authentication controls, impact would be limited to the specific vulnerable component.
🎯 Exploit Status
Exploit has been published but requires specific conditions and manipulation of domain arguments.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.0.0-alpha.32
Vendor Advisory: https://github.com/decocms/mesh/releases/tag/runtime-v1.0.0-alpha.32
Restart Required: Yes
Instructions:
1. Backup current configuration. 2. Update DecoCMS Mesh to version 1.0.0-alpha.32 or later. 3. Restart the service. 4. Verify the patch is applied.
🔧 Temporary Workarounds
Restrict network access
allLimit network access to the DecoCMS Mesh instance to trusted sources only
Disable vulnerable component
allTemporarily disable the Workspace Domain Handler if not essential
🧯 If You Can't Patch
- Implement strict network segmentation to isolate the vulnerable component
- Enhance monitoring and alerting for suspicious access patterns to the createTool function
🔍 How to Verify
Check if Vulnerable:
Check package.json or version file for DecoCMS Mesh version. If version is 1.0.0-alpha.31 or earlier, system is vulnerable.
Check Version:
Check package.json or run: npm list @decocms/mesh (if using npm)
Verify Fix Applied:
Verify version is 1.0.0-alpha.32 or later and check that commit 5f7315e05852faf3a9c177c0a34f9ea9b0371d3d is present.
📡 Detection & Monitoring
Log Indicators:
- Unusual createTool API calls with modified domain parameters
- Access attempts to workspace domains from unauthorized users
Network Indicators:
- Suspicious API requests to /mcp/teams endpoints with unusual domain values
SIEM Query:
source="decocms" AND (endpoint="/mcp/teams" OR function="createTool") AND status!=401
🔗 References
- https://github.com/decocms/mesh/commit/5f7315e05852faf3a9c177c0a34f9ea9b0371d3d
- https://github.com/decocms/mesh/pull/1967
- https://github.com/decocms/mesh/pull/1967#issue-3700934099
- https://github.com/decocms/mesh/pull/1967#issuecomment-3622379237
- https://github.com/decocms/mesh/releases/tag/runtime-v1.0.0-alpha.32
- https://vuldb.com/?ctiid.336392
- https://vuldb.com/?id.336392
- https://vuldb.com/?submit.713741