CVE-2025-15602

8.8 HIGH

📋 TL;DR

This mass assignment vulnerability in Snipe-IT allows authenticated low-privileged users to modify restricted user attributes, including those of Super Admin accounts. By changing the Super Admin's email and triggering a password reset, attackers can gain complete administrative control. All Snipe-IT instances running versions before 8.3.7 are affected.

💻 Affected Systems

Products:
  • Snipe-IT
Versions: All versions prior to 8.3.7
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access, but any low-privileged account can exploit this vulnerability.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Snipe-IT instance with administrative control, allowing data theft, system manipulation, and potential lateral movement to connected systems.

🟠

Likely Case

Privilege escalation leading to unauthorized administrative access, data exfiltration, and system configuration changes.

🟢

If Mitigated

Limited impact with proper access controls and monitoring, potentially detected before full compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once an attacker has any valid user account.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.3.7

Vendor Advisory: https://github.com/grokability/snipe-it/releases/tag/v8.3.7

Restart Required: Yes

Instructions:

1. Backup your Snipe-IT database and files. 2. Update to version 8.3.7 or later via git pull or package update. 3. Run database migrations if required. 4. Restart web server services.

🔧 Temporary Workarounds

API Rate Limiting

all

Implement strict rate limiting on API endpoints to slow down potential mass assignment attacks.

Configure web server rate limiting (e.g., nginx limit_req, Apache mod_ratelimit)

Enhanced Monitoring

all

Monitor for unusual API requests modifying user attributes, especially email changes.

Set up alerts for POST/PUT requests to user API endpoints

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Snipe-IT from critical systems
  • Enforce multi-factor authentication for all user accounts and monitor for suspicious login attempts

🔍 How to Verify

Check if Vulnerable:

Check Snipe-IT version in web interface footer or via command line in installation directory.

Check Version:

cd /path/to/snipe-it && php artisan --version

Verify Fix Applied:

Confirm version is 8.3.7 or later and test API endpoints for mass assignment protection.

📡 Detection & Monitoring

Log Indicators:

  • Unusual API requests modifying user email fields
  • Multiple failed login attempts followed by password reset requests
  • User privilege changes from low to admin

Network Indicators:

  • Bursts of API requests to user modification endpoints
  • Unusual patterns in authentication traffic

SIEM Query:

source="snipe-it-logs" AND (user_email_changed OR admin_privilege_modified)

🔗 References

📤 Share & Export