CVE-2025-52166

6.5 MEDIUM

📋 TL;DR

This vulnerability allows authenticated attackers in Agorum core open software to escalate their privileges to Administrator level, gaining unauthorized access to sensitive components and information. It affects organizations using Agorum core open v11.9.2 and v11.10.1 with authenticated user accounts.

💻 Affected Systems

Products:
  • Software GmbH Agorum core open
Versions: v11.9.2 and v11.10.1
Operating Systems: Any OS running Agorum core open
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated attacker access; affects both specified versions regardless of underlying OS.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers gain administrative control, access all sensitive data, modify configurations, and potentially pivot to other systems.

🟠

Likely Case

Attackers with existing user accounts escalate to admin privileges, accessing confidential documents and system settings they shouldn't have permission to view or modify.

🟢

If Mitigated

Limited impact if strong network segmentation, monitoring, and least privilege principles are already implemented, though privilege escalation would still occur.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but appears straightforward based on CWE-284 (Improper Access Control) description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references

Vendor Advisory: http://agorum.com

Restart Required: No

Instructions:

1. Check vendor advisory at http://agorum.com for official patch or update. 2. If patch available, apply following vendor instructions. 3. Verify privilege escalation is no longer possible.

🔧 Temporary Workarounds

Restrict User Account Access

all

Limit authenticated user accounts to only essential personnel and implement strict access controls.

Network Segmentation

all

Isolate Agorum systems from critical network segments to limit lateral movement if compromised.

🧯 If You Can't Patch

  • Implement strict monitoring of privilege escalation attempts and administrative actions
  • Apply principle of least privilege to all user accounts and regularly audit permissions

🔍 How to Verify

Check if Vulnerable:

Check Agorum version via admin interface or configuration files; if running v11.9.2 or v11.10.1, system is vulnerable.

Check Version:

Check Agorum web interface admin panel or configuration files for version information

Verify Fix Applied:

Test if authenticated non-admin users can perform administrative actions or access restricted components after applying vendor patch.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • User accounts gaining administrative permissions
  • Access to admin-only interfaces from non-admin accounts

Network Indicators:

  • Unusual authentication patterns from user accounts
  • Access to administrative endpoints from non-admin IPs

SIEM Query:

source="agorum_logs" AND (event_type="privilege_escalation" OR user_role_changed="admin")

🔗 References

📤 Share & Export