CVE-2025-67493

7.5 HIGH

📋 TL;DR

This vulnerability in Homarr allows privilege escalation and unauthorized access to other users' groups through crafted LDAP search queries due to insufficient input sanitization. It affects all Homarr instances using LDAP authentication where an attacker has access to any user account. The vulnerability was patched in version 1.45.3.

💻 Affected Systems

Products:
  • Homarr
Versions: All versions prior to 1.45.3
Operating Systems: All platforms running Homarr
Default Config Vulnerable: ✅ No
Notes: Only affects instances configured with LDAP authentication. Local authentication or other auth methods are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with any user account could escalate privileges to administrative access, access sensitive data from other users' groups, and potentially compromise the entire Homarr instance and connected systems.

🟠

Likely Case

Malicious insider or compromised user account could access unauthorized groups, modify dashboard configurations, and potentially gain administrative privileges within Homarr.

🟢

If Mitigated

With proper network segmentation and monitoring, impact would be limited to the Homarr instance itself without lateral movement to other systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to any user account in LDAP-enabled Homarr instances. The vulnerability is in LDAP query construction.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.45.3

Vendor Advisory: https://github.com/homarr-labs/homarr/security/advisories/GHSA-59gp-q3xx-489q

Restart Required: Yes

Instructions:

1. Backup your Homarr configuration. 2. Update Homarr to version 1.45.3 or later using your deployment method (Docker, manual, etc.). 3. Restart the Homarr service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable LDAP Authentication

all

Temporarily switch to local authentication or disable authentication entirely until patching is possible

Modify Homarr configuration to use local auth or disable auth

Network Segmentation

all

Restrict access to Homarr instance to trusted networks only

Configure firewall rules to limit Homarr access

🧯 If You Can't Patch

  • Implement strict access controls and monitor all LDAP authentication attempts
  • Disable LDAP authentication and use alternative authentication methods

🔍 How to Verify

Check if Vulnerable:

Check Homarr version and LDAP configuration. If version < 1.45.3 and LDAP auth is enabled, the system is vulnerable.

Check Version:

Check Homarr web interface settings or container/image version

Verify Fix Applied:

Verify Homarr version is 1.45.3 or later and test LDAP authentication functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual LDAP query patterns
  • Multiple failed authentication attempts followed by successful escalation
  • User accessing groups they shouldn't have permissions for

Network Indicators:

  • Unusual LDAP traffic patterns to Homarr instance
  • Multiple authentication requests from single source

SIEM Query:

source="homarr" AND (event="ldap_query" OR event="authentication") AND (status="success" OR query="*") | stats count by user, source_ip

🔗 References

📤 Share & Export