CVE-2024-25169:
Mezzanine allows attackers to bypass access control mechanisms
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.68299%
CWE
-
Published
2/28/2024
Updated
2/28/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
Mezzanine | pip | <= 6.0.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The provided information lacks concrete technical details required to identify specific vulnerable functions. There are no code examples, commit diffs, or patch details showing implementation flaws. The advisory references image-based POCs (hosted on ImgBB) that are not accessible for analysis, and the CVE description only mentions 'crafted requests' without specifying affected components. While the vulnerability likely exists in admin panel/modules/plugins/
access control checks (e.g., missing permission validation()
in view functions or middleware), the absence of Mezzanine
's actual code context or exploit specifics makes it impossible to pinpoint exact functions with high confidence.