CVE-2025-65096

4.3 MEDIUM

📋 TL;DR

This vulnerability in RomM (ROM Manager) allows authenticated users to access private game collections belonging to other users by directly querying collection IDs via API. The system fails to verify ownership or check collection privacy settings before returning data. All RomM instances running vulnerable versions are affected.

💻 Affected Systems

Products:
  • RomM (ROM Manager)
Versions: All versions prior to 4.4.1 and 4.4.1-beta.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious authenticated users could systematically enumerate and exfiltrate all private collections, potentially exposing sensitive personal gaming data, collection metadata, and organizational structures.

🟠

Likely Case

Authenticated users accidentally or intentionally accessing other users' private collections, violating privacy expectations and potentially exposing personal gaming preferences.

🟢

If Mitigated

With proper access controls and API validation, users can only access their own collections or public collections as intended.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but involves simple API calls to enumerate collection IDs.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.4.1 or 4.4.1-beta.2

Vendor Advisory: https://github.com/rommapp/romm/security/advisories/GHSA-5ghc-8wr3-788c

Restart Required: Yes

Instructions:

1. Backup your RomM instance and database. 2. Update to version 4.4.1 or 4.4.1-beta.2 using your deployment method (Docker, manual, etc.). 3. Restart the RomM service. 4. Verify the update was successful.

🔧 Temporary Workarounds

API Access Restriction

all

Implement network-level restrictions to limit API access to trusted users only

Authentication Enhancement

all

Add additional authentication layers or rate limiting to collection API endpoints

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate RomM from untrusted networks
  • Add application-level authorization checks through reverse proxy or WAF rules

🔍 How to Verify

Check if Vulnerable:

Check RomM version via web interface or API. If version is below 4.4.1 (excluding 4.4.1-beta.2), the system is vulnerable.

Check Version:

curl -s http://romm-instance/api/version | grep version

Verify Fix Applied:

After updating, attempt to access another user's private collection via API using a valid collection ID that doesn't belong to your account. Access should be denied.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authorization attempts on collection endpoints
  • Unusual pattern of collection ID enumeration in API logs
  • Access to collection IDs outside normal user patterns

Network Indicators:

  • High volume of GET requests to /api/collections/{id} endpoints
  • Sequential enumeration of collection IDs in API calls

SIEM Query:

source="romm" AND (uri_path="/api/collections/*" AND response_status=200) | stats count by user_id, collection_id

🔗 References

📤 Share & Export