Vulnerability Database

309,364

Total vulnerabilities in the database

CVE-2025-4692

Actors can use a maliciously crafted JavaScript object notation (JSON) web token (JWT) to perform privilege escalation by submitting the malicious JWT to a vulnerable method exposed on the cloud platform. If the exploit is successful, the user can escalate privileges to access any device managed by the

ABUP Cloud Update Platform.

  • Published: May 23, 2025
  • Updated: Nov 16, 2025
  • CVE: CVE-2025-4692
  • Severity: Medium
  • Exploit:

CVSS v3:

  • Severity: Medium
  • Score: 6.8
  • AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L

CWEs: