Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. snipe/snipe-it
  4. ›
  5. CVE-2025-15602

CVE-2025-15602: Snipe-IT has sensitive user attributes related to account privileges that are insufficiently protected against mass assignment

March 6, 2026 (updated March 7, 2026)

Snipe-IT versions prior to 8.3.7 contain sensitive user attributes related to account privileges that are insufficiently protected against mass assignment. An authenticated, low-privileged user can craft a malicious API request to modify restricted fields of another user account, including the Super Admin account. By changing the email address of the Super Admin and triggering a password reset, an attacker can fully take over the Super Admin account, resulting in complete administrative control of the Snipe-IT instance.

References

  • github.com/advisories/GHSA-5448-v74m-7mv7
  • github.com/grokability/snipe-it
  • github.com/grokability/snipe-it/releases/tag/v8.3.7
  • nvd.nist.gov/vuln/detail/CVE-2025-15602
  • snipeitapp.com/
  • www.vulncheck.com/advisories/snipe-it-mass-assignment-vulnerability-leading-to-privilege-escalation

Code Behaviors & Features

Detect and mitigate CVE-2025-15602 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 8.3.7

Fixed versions

  • 8.3.7

Solution

Upgrade to version 8.3.7 or above.

Impact 8.8 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes

Source file

packagist/snipe/snipe-it/CVE-2025-15602.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Mon, 09 Mar 2026 00:18:13 +0000.