In Terminalfour 8 through 8.4.1.1, the userLevel parameter in the user management function is not subject to proper server-side authorization checks. A Power User can intercept and modify this parameter to assign the Administrator role to other existing lower-privileged accounts, or invite a new lower-privileged account and escalate its privileges. While manipulating this request, the Power User can also change the target account's password, effectively taking full control of it.
History

Wed, 03 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-285
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 03 Dec 2025 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Terminalfour
Terminalfour terminalfour
Vendors & Products Terminalfour
Terminalfour terminalfour

Tue, 02 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
Description In Terminalfour 8 through 8.4.1.1, the userLevel parameter in the user management function is not subject to proper server-side authorization checks. A Power User can intercept and modify this parameter to assign the Administrator role to other existing lower-privileged accounts, or invite a new lower-privileged account and escalate its privileges. While manipulating this request, the Power User can also change the target account's password, effectively taking full control of it.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-12-02T00:00:00.000Z

Updated: 2025-12-03T15:13:08.720Z

Reserved: 2025-08-29T00:00:00.000Z

Link: CVE-2025-58386

cve-icon Vulnrichment

Updated: 2025-12-03T15:12:33.824Z

cve-icon NVD

Status : Received

Published: 2025-12-02T18:15:48.007

Modified: 2025-12-03T16:15:57.430

Link: CVE-2025-58386

cve-icon Redhat

No data.