CVE-2025-67793

An issue was discovered in DriveLock 24.1 through 24.1.*, 24.2 through 24.2.*, and 25.1 before 25.1.6. Users with the "Manage roles and permissions" privilege can promote themselves or other DOC users to the Supervisor role through an API call. This privilege is included by default in the Administrator role. This issue mainly affects cloud multi-tenant deployments; on-prem single-tenant installations are typically not impacted because local admins usually already have Supervisor privileges.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:drivelock:drivelock:*:*:*:*:*:*:*:*
cpe:2.3:a:drivelock:drivelock:*:*:*:*:*:*:*:*
cpe:2.3:a:drivelock:drivelock:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-12-17 21:16

Updated : 2026-01-02 15:54


NVD link : CVE-2025-67793

Mitre link : CVE-2025-67793

CVE.ORG link : CVE-2025-67793


JSON object : View

Products Affected

drivelock

  • drivelock
CWE
CWE-269

Improper Privilege Management