VYPR
Moderate severityNVD Advisory· Published Sep 30, 2025· Updated Oct 1, 2025

CVE-2025-55797

CVE-2025-55797

Description

An improper access control vulnerability in FormCms v0.5.4 in the /api/schemas/history/[schemaId] endpoint allows unauthenticated attackers to access historical schema data if a valid schemaId is known or guessed.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

FormCMS v0.5.4 exposes historical schema data via an unauthenticated API endpoint, allowing attackers to access sensitive schema definitions with a known or guessed schemaId.

Vulnerability

Overview

CVE-2025-55797 is an improper access control vulnerability in FormCMS v0.5.4, specifically in the /api/schemas/history/[schemaId] endpoint [1][2][3]. The endpoint returns all historical versions of a schema, including the complete schema data, without requiring any authentication [1][4]. This flaw allows an unauthenticated attacker to retrieve sensitive schema definitions if they can discover or guess a valid schemaId.

Attack

Vector and Exploitation

The vulnerability is exploitable remotely over the network. No authentication is required to access the endpoint [1]. An attacker can enumerate or brute-force schemaId values (which may be sequential or predictable) to retrieve historical schema data [4]. The official advisory notes that the schema history includes complete schema structures, potentially exposing database schema design, field names, data types, and relationships [4].

Impact

Successful exploitation results in unauthorized information disclosure [4]. An attacker can gain insight into the underlying data model of the FormCMS instance, which can be used to craft further attacks or extract sensitive metadata about the application's data structures [1][4]. This exposure of schema definitions may aid in exploiting other vulnerabilities or performing reconnaissance on the target system.

Mitigation

Status

The issue has been addressed in FormCMS v0.5.5 [4]. Users running v0.5.4 or earlier should upgrade to the latest version. There is no indication that the endpoint requires input sanitization or rate-limiting as a workaround; the fix likely implements proper authentication and authorization checks on the history endpoint [4].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
FormCMSNuGet
< 0.5.50.5.5

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.