6.5 CVE-2025-55736
Exploit
flaskBlog is a blog app built with Flask. In 2.8.0 and earlier, an arbitrary user can change his role to "admin", giving its relative privileges (e.g. delete users, posts, comments etc.). The problem is in the routes/adminPanelUsers file.
https://nvd.nist.gov/vuln/detail/CVE-2025-55736
Categories
CWE-425
References
security-advisories@github.com Exploit
| https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-6q83-vfmq-... Exploit Third Party Advisory |
CPE
| cpe | start | end |
|---|---|---|
| Configuration 1 | ||
| cpe:2.3:a:dogukanurker:flaskblog:*:*:*:*:*:*:*:* | <= 2.8.0 | |
REMEDIATION
EXPLOITS
Exploit-db.com
| id | description | date | |
|---|---|---|---|
| No known exploits | |||
POC Github
| Url |
|---|
Other Nist (github, ...)
| Url |
|---|
| https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-6q83-vfmq-... |
CAPEC
Common Attack Pattern Enumerations and Classifications
| id | description | severity |
|---|---|---|
| No entry | ||
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
