SOPlanning is vulnerable to Privilege Escalation in user management tab. Users with user_manage_team role are allowed to modify permissions of users. However, they are able to assign administrative permissions to any user including themselves. This allow a malicious authenticated attacker with this role to escalate to admin privileges. This issue affects both Bulk Update functionality and regular edition of user's right and privileges.
This issue was fixed in version 1.55.
References
| Link | Resource |
|---|---|
| https://cert.pl/en/posts/2025/11/CVE-2025-62293 | Third Party Advisory |
| https://www.soplanning.org/en/ | Product |
Configurations
History
24 Nov 2025, 13:53
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://cert.pl/en/posts/2025/11/CVE-2025-62293 - Third Party Advisory | |
| References | () https://www.soplanning.org/en/ - Product | |
| CPE | cpe:2.3:a:soplanning:soplanning:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| First Time |
Soplanning soplanning
Soplanning |
20 Nov 2025, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-20 16:16
Updated : 2025-11-24 13:53
NVD link : CVE-2025-62730
Mitre link : CVE-2025-62730
CVE.ORG link : CVE-2025-62730
JSON object : View
Products Affected
soplanning
- soplanning
CWE
CWE-863
Incorrect Authorization
