CVE-2025-24859

Broken Access
Affects
Apache Roller
>1.0.0 <=6.1.4
in
Apache Roller
No items found.
Exclamation circle icon
Patch Available

This Vulnerability has been fixed in the Never-Ending Support (NES) version offered by HeroDevs

Overview

Apache Roller is an open-source Java-based blogging platform designed for creating and managing multi-user blogs with customizable themes and plugins.

This Broken Access Control vulnerability in Apache Roller (versions ≤6.1.4) involves insufficient session expiration, where active user sessions remain valid after password changes. If user credentials were previously compromised, a malicious actor can obtain unauthorized access through the previous, still-active session.

The vulnerability is fixed in Apache Roller 6.1.5 by implementing centralized session management that properly invalidates all active sessions when passwords are changed or users are disabled.

Broken Access Control occurs when an application fails to properly enforce restrictions on what authenticated users are allowed to do, enabling attackers to access unauthorized functionality, data, or resources. It often stems from inadequate validation of user permissions, allowing someone to bypass intended security boundaries and perform actions beyond their assigned role.

Any of the following ramifications are possible:

  • Allowing arbitrary code execution
  • Complete system compromise
  • Data theft or exposure
  • Data manipulation or destruction
  • Privilege escalation, and
  • Denial of service.

Although Broken Access Control exploits are often serious, this is rated as low-severity because of the following mitigating factors:

  • Specific conditions make exploitation less likely. 
  • The prior password needs to have been compromised and an active session using that password must exist.
  • If exploitation succeeds, the potential harm is confined to unauthorized access to a single user's blog account without broader system-level consequences.

Details


Module Info

Product: Apache Roller

Affected packages: Apache Roller

Package manager: npm


Vulnerability Info

This low-severity vulnerability is found in Apache Roller versions lower than (and including) 6.1.4.

Addressing the Issue

Users of the affected component should apply one of the following mitigations:

  • Manually invalidate the user sessions after changing a password.
  • Manually invalidate all user sessions after changing a password by restarting the server or clearing all session data.
  • Ensure session timeouts are active.
  • Sign up for security support; HeroDevs customers get immediate access to a patched version of this module.

Vulnerability Details
ID
CVE-2025-24859
PROJECT Affected
Apache Roller
Versions Affected
>1.0.0 <=6.1.4
Published date
April 14, 2025
≈ Fix date
April 14, 2025
Severity
Low
Category
Broken Access
Sign up for the latest vulnerability alerts fixed in
Apache Roller NES
Rss feed icon
Subscribe via RSS
or
Thanks for signing up for our Newsletter! We look forward to connecting with you.
Oops! Something went wrong while submitting the form.