CVE-2025-53922

4.9 MEDIUM

📋 TL;DR

This vulnerability allows authenticated group manager users in Galette to bypass intended restrictions on Contributions and Transactions functionality. It affects Galette versions 1.1.4 through 1.1.x before 1.2.0. The issue enables unauthorized access to financial management features that should be restricted.

💻 Affected Systems

Products:
  • Galette
Versions: 1.1.4 through 1.1.x (before 1.2.0)
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with group manager users configured. Requires authenticated access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Group managers could manipulate financial records, create unauthorized transactions, or modify contribution data, potentially leading to financial fraud or data integrity issues within the organization.

🟠

Likely Case

Group managers gain unintended access to view or modify contributions and transactions they shouldn't have permissions for, potentially exposing sensitive financial information.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to authorized users gaining additional but still limited functionality within their legitimate scope.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access as a group manager user. The vulnerability is an authorization bypass rather than a technical exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.0

Vendor Advisory: https://github.com/galette/galette/security/advisories/GHSA-5jp7-5c38-3pv6

Restart Required: Yes

Instructions:

1. Backup your Galette installation and database. 2. Download Galette version 1.2.0 from the official repository. 3. Replace existing files with the new version. 4. Run any database migration scripts if provided. 5. Restart your web server.

🔧 Temporary Workarounds

Restrict Group Manager Permissions

all

Temporarily reduce group manager permissions or disable group manager accounts until patching is complete.

# Review and modify user permissions in Galette admin interface
# Consider temporarily promoting group managers to regular members

🧯 If You Can't Patch

  • Implement strict monitoring of financial transactions and contributions for unusual activity by group managers.
  • Consider temporarily disabling the Contributions and Transactions modules if not critically needed.

🔍 How to Verify

Check if Vulnerable:

Check your Galette version in the admin interface or by examining the application files. Versions 1.1.4 through 1.1.x are vulnerable.

Check Version:

Check Galette admin dashboard or examine includes/config.inc.php for version information.

Verify Fix Applied:

After upgrading to 1.2.0, verify that group manager users cannot access Contributions and Transactions features beyond their intended permissions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to contributions or transactions modules by group manager users
  • Failed authorization attempts followed by successful access to restricted financial features

Network Indicators:

  • HTTP requests to financial endpoints from group manager accounts

SIEM Query:

source="galette_logs" AND (uri="/contributions" OR uri="/transactions") AND user_role="group_manager"

🔗 References

📤 Share & Export