CVE-2025-15602
Description
Snipe-IT versions prior to 8.3.7 contain sensitive user attributes related to account privileges that are insufficiently protected against mass assignment. An authenticated, low-privileged user can craft a malicious API request to modify restricted fields of another user account, including the Super Admin account. By changing the email address of the Super Admin and triggering a password reset, an attacker can fully take over the Super Admin account, resulting in complete administrative control of the Snipe-IT instance.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
snipe/snipe-itPackagist | < 8.3.7 | 8.3.7 |
Affected products
1Patches
178d1256b742eVulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- www.vulncheck.com/advisories/snipe-it-mass-assignment-vulnerability-leading-to-privilege-escalationnvdPatchThird Party AdvisoryWEB
- github.com/advisories/GHSA-5448-v74m-7mv7ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-15602ghsaADVISORY
- github.com/grokability/snipe-it/releases/tag/v8.3.7nvdProductRelease NotesWEB
- snipeitapp.comghsaWEB
- snipeitapp.comnvdProduct
News mentions
0No linked articles in our index yet.