Skip to content

Exploit for CVE-2025-10352. Admin account creation on Melis Platform Framework

License

Notifications You must be signed in to change notification settings

ivansmc00/CVE-2025-10352-POC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2025-10352 POC - Admin Account Creation 🛠️

POC for CVE-2025-10352: An unauthenticated endpoint in Melis Platform (melis-core) that allows creation of an administrator account via a crafted HTTP request to a specific admin endpoint.

status request


🔗 References


🚀 Description

This PoC targets an unauthenticated administrative endpoint in the melis-core module:

/melis/MelisCore/ToolUser/addNewUser

A remote unauthenticated attacker can submit a crafted request to this endpoint to create a new user with administrator privileges. Because the endpoint lacks proper authentication and authorization checks, the attacker gains persistent administrative access to the application.

Impact includes:

  • Creation of persistent admin accounts.
  • Full administrative takeover of the web application.
  • Potential lateral movement, data exfiltration, and destructive actions.

🛠️ Requirements

  • Burp Suite (recommended) or any HTTP proxy that accepts raw HTTP requests.
  • curl, nc/netcat, or socat for manual testing if you prefer CLI.
  • Access to CVE-2025-10352-POC.txt (raw HTTP request exported from Burp).
  • Authorization to test the target system (see legal notice).

🧪 Usage

Basic check (Burp Repeater)

  1. Open Burp → Repeater.
  2. Open CVE-2025-10352-POC.txt, copy the raw HTTP request.
  3. Paste into a new Repeater tab, set the proper host and press Send.
  4. Check response for success (200/201/302 or JSON/text confirming creation).
  5. Attempt login with the created credentials or confirm via the user listing endpoint.

⚠️ Disclaimer

This document is for authorized security testing and remediation only. Do not use the PoC or reproduction steps against systems you do not own or do not have explicit permission to test. The author is not responsible for misuse.


Made with ❤️ by Manuel Iván San Martín Castillo

About

Exploit for CVE-2025-10352. Admin account creation on Melis Platform Framework

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published