CVE-2025-62730

8.8 HIGH

📋 TL;DR

SOPlanning users with the user_manage_team role can assign administrative permissions to any user, including themselves, allowing privilege escalation to admin. This affects both Bulk Update and regular user rights editing. All SOPlanning instances below version 1.55 are vulnerable.

💻 Affected Systems

Products:
  • SOPlanning
Versions: All versions before 1.55
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Any SOPlanning instance with users assigned the user_manage_team role is vulnerable. The role itself enables the exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker with user_manage_team role gains full administrative control over the SOPlanning instance, potentially compromising all data, configurations, and user accounts.

🟠

Likely Case

A malicious insider or compromised account with user_manage_team role escalates to admin, gaining unauthorized access to sensitive planning data and system controls.

🟢

If Mitigated

With proper role separation and monitoring, impact is limited to unauthorized permission changes that can be detected and reversed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with user_manage_team role. The vulnerability is straightforward to exploit via the user management interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.55

Vendor Advisory: https://www.soplanning.org/en/

Restart Required: Yes

Instructions:

1. Backup your SOPlanning instance and database.
2. Download version 1.55 or later from the official SOPlanning website.
3. Follow the SOPlanning upgrade documentation to apply the update.
4. Restart the SOPlanning service or web server.
5. Verify the fix by testing user permission assignments.

🔧 Temporary Workarounds

Remove user_manage_team role

all

Temporarily remove the user_manage_team role from all users until patching is complete.

UPDATE users SET roles = REPLACE(roles, 'user_manage_team', '') WHERE roles LIKE '%user_manage_team%';

Restrict user management access

all

Limit network access to the SOPlanning user management interface using firewall rules or access controls.

🧯 If You Can't Patch

  • Audit all users with user_manage_team role and monitor their activity closely.
  • Implement strict logging and alerting for permission changes in the user management tab.

🔍 How to Verify

Check if Vulnerable:

Check if your SOPlanning version is below 1.55 by viewing the version in the web interface or configuration files.

Check Version:

Check the SOPlanning web interface footer or the config.php file for version information.

Verify Fix Applied:

After updating to version 1.55 or later, verify that users with user_manage_team role cannot assign administrative permissions.

📡 Detection & Monitoring

Log Indicators:

  • Log entries showing permission changes from non-admin users
  • User role modifications in application logs

Network Indicators:

  • HTTP POST requests to user management endpoints from non-admin accounts

SIEM Query:

source="SOPlanning" AND (event="user_permission_change" OR event="role_modification") AND user_role!="admin"

🔗 References

📤 Share & Export