PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-21092 GMOD CVE debrief

CVE-2025-21092 is a medium-severity authorization issue in GMOD Apollo. CISA states that the product does not have sufficient logical or access checks when updating a user's information, which could allow an attacker to escalate privileges for themselves or others. The affected range is GMOD Apollo versions prior to 2.8.0, and the vendor remediation is to update to version 2.8.0.

Vendor
GMOD
Product
Apollo
CVSS
MEDIUM 6.5
CISA KEV
Not listed in stored evidence
Original CVE published
2025-03-04
Original CVE updated
2025-03-04
Advisory published
2025-03-04
Advisory updated
2025-03-04

Who should care

Administrators, operators, and security teams responsible for GMOD Apollo deployments, especially in environments where Apollo user management is exposed to authenticated users or integrated into operational workflows.

Technical summary

The CSAF advisory describes an access-control weakness in the user-information update path. The supplied CVSS v3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) indicates network reachability, low attack complexity, no user interaction, and the need for low privileges, with the primary impact being high integrity compromise. The affected product entry is GMOD Apollo: <2.8.0, and the recommended fix is Apollo 2.8.0 or later.

Defensive priority

Priority should be moderate to high for any environment running Apollo below 2.8.0, because privilege escalation can undermine account integrity and administrative trust even without affecting availability. The issue is not listed as a known-exploited vulnerability in the supplied corpus, but it is an authorization flaw with direct integrity impact.

Recommended defensive actions

  • Upgrade GMOD Apollo to version 2.8.0 or later.
  • Inventory all Apollo instances and confirm whether any deployments are still below 2.8.0.
  • Review account and role changes for unexpected privilege grants or suspicious user-profile update activity.
  • Limit access to user-management functions to the smallest practical set of authenticated administrators.
  • If upgrading is delayed, apply compensating access controls and monitor authentication and authorization events closely.

Evidence notes

This debrief is based on the CISA CSAF advisory ICSA-25-063-07 and the supplied CVE record data. The advisory explicitly identifies the weakness as insufficient logical or access checks during user-information updates, lists GMOD Apollo <2.8.0 as affected, and recommends updating to 2.8.0. The supplied corpus does not indicate KEV listing or known ransomware use.

Official resources

Publicly disclosed on 2025-03-04 in CISA advisory ICSA-25-063-07; no KEV date or due date is provided in the supplied corpus.