CVE-2025-67793

An issue was discovered in DriveLock 24.1 through 24.1.*, 24.2 through 24.2.*, and 25.1 before 25.1.6. Users with the "Manage roles and permissions" privilege can promote themselves or other DOC users to the Supervisor role through an API call. This privilege is included by default in the Administrator role. This issue mainly affects cloud multi-tenant deployments; on-prem single-tenant installations are typically not impacted because local admins usually already have Supervisor privileges.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:drivelock:drivelock:*:*:*:*:*:*:*:*
cpe:2.3:a:drivelock:drivelock:*:*:*:*:*:*:*:*
cpe:2.3:a:drivelock:drivelock:*:*:*:*:*:*:*:*

History

02 Jan 2026, 15:54

Type Values Removed Values Added
CPE cpe:2.3:a:drivelock:drivelock:*:*:*:*:*:*:*:*
First Time Drivelock
Drivelock drivelock
References () https://drivelock.help/sb/Content/SecurityBulletins/25-008-DESPrivilegeEsc.htm - () https://drivelock.help/sb/Content/SecurityBulletins/25-008-DESPrivilegeEsc.htm - Vendor Advisory

18 Dec 2025, 20:16

Type Values Removed Values Added
CWE CWE-269
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

17 Dec 2025, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-17 21:16

Updated : 2026-01-02 15:54


NVD link : CVE-2025-67793

Mitre link : CVE-2025-67793

CVE.ORG link : CVE-2025-67793


JSON object : View

Products Affected

drivelock

  • drivelock
CWE
CWE-269

Improper Privilege Management