Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-250 (带着不必要的权限执行) — Vulnerability Class 236

236 vulnerabilities classified as CWE-250 (带着不必要的权限执行). AI Chinese analysis included.

CWE-250 represents a critical architectural weakness where software executes operations using elevated privileges beyond what is strictly necessary for the task. This misconfiguration typically allows attackers to exploit other vulnerabilities, such as buffer overflows or injection flaws, by granting them higher-level access than intended. If an attacker compromises a low-privilege component, the excessive permissions amplify the impact, potentially leading to full system compromise or unauthorized data modification. To mitigate this risk, developers must adhere to the principle of least privilege, ensuring that each process or user account operates with only the minimum permissions required for its specific function. Implementing strict access controls, regularly auditing permission assignments, and isolating services further reduce the attack surface, thereby limiting the potential damage from any single security breach.

MITRE CWE Description
The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.
Common Consequences (1)
Confidentiality, Integrity, Availability, Access ControlGain Privileges or Assume Identity, Execute Unauthorized Code or Commands, Read Application Data, DoS: Crash, Exit, or Restart
An attacker will be able to gain access to any resources that are allowed by the extra privileges. Common results include executing code, disabling services, and reading restricted data. New weaknesses can be exposed because running with extra privileges, such as root or Administrator, can disable t…
Mitigations (5)
Architecture and Design, OperationRun your code using the lowest privileges that are required to accomplish the necessary tasks [REF-76]. If possible, create isolated accounts with limited privileges that are only used for a single task. That way, a successful attack will not immediately give the attacker access to the rest of the software or its environment. For example, database applications rarely need to run as the database ad…
Architecture and DesignIdentify the functionality that requires additional privileges, such as access to privileged operating system resources. Wrap and centralize this functionality if possible, and isolate the privileged code as much as possible from other code [REF-76]. Raise privileges as late as possible, and drop them as soon as possible to avoid CWE-271. Avoid weaknesses such as CWE-288 and CWE-420 by protecting …
Architecture and DesignIdentify the functionality that requires additional privileges, such as access to privileged operating system resources. Wrap and centralize this functionality if possible, and isolate the privileged code as much as possible from other code [REF-76]. Raise privileges as late as possible, and drop them as soon as possible to avoid CWE-271. Avoid weaknesses such as CWE-288 and CWE-420 by protecting …
ImplementationPerform extensive input validation for any privileged code that must be exposed to the user and reject anything that does not fit your strict requirements.
ImplementationWhen dropping privileges, ensure that they have been dropped successfully to avoid CWE-273. As protection mechanisms in the environment get stronger, privilege-dropping calls may fail even if it seems like they would always succeed.
Examples (2)
This code temporarily raises the program's privileges to allow creation of a new user folder.
def makeNewUserDir(username): if invalidUsername(username): #avoid CWE-22 and CWE-78 print('Usernames cannot contain invalid characters') return False try: raisePrivileges() os.mkdir('/home/' + username) lowerPrivileges() except OSError: print('Unable to create new user directory for user:' + username) return False return True
Bad · Python
The following code calls chroot() to restrict the application to a subset of the filesystem below APP_HOME in order to prevent an attacker from using the program to gain unauthorized access to files located elsewhere. The code then opens a file specified by the user and processes the contents of the file.
chroot(APP_HOME); chdir("/"); FILE* data = fopen(argv[1], "r+"); ...
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2025-33224 NVIDIA Isaac Launchable 安全漏洞 — Isaac Launchable 9.8 Critical2025-12-23
CVE-2025-34290 Versa SASE Client for Windows < 7.9.5 Arbitrary Folder Deletion Leading to Local Privilege Escalation — SASE Client for Windows 7.0AIHighAI2025-12-20
CVE-2025-13911 Inductive Automation Ignition Execution with Unnecessary Privileges — Ignition 6.4 Medium2025-12-18
CVE-2025-13506 Improper Authorization in Nebim Neyir's Nebim V3 ERP — Nebim V3 ERP 8.8 High2025-12-12
CVE-2025-67510 MySQLWriteTool allows arbitrary/destructive SQL when exposed to untrusted prompts (agent “footgun”) — neuron-ai 9.4 Critical2025-12-10
CVE-2025-62876 LightDM KDE Greeter 安全漏洞 — openSUSE 7.8 -2025-11-12
CVE-2025-9055 AXIS OS 安全漏洞 — AXIS OS 6.4 Medium2025-11-11
CVE-2025-46430 Dell Display and Peripheral Manager 安全漏洞 — Display and Peripheral Manager 7.3 High2025-11-10
CVE-2025-36186 IBM Db2 privilege escalation — Db2 7.4 High2025-11-07
CVE-2025-10885 Privilege Escalation Vulnerability — Installer 7.8 High2025-11-06
CVE-2025-43990 Dell Command Monitor 安全漏洞 — Command Monitor (DCM) 7.3 High2025-11-05
CVE-2025-33003 IBM InfoSphere Information Server is vulnerable to privilege escalation — InfoSphere Information Server 7.8 High2025-10-31
CVE-2018-25123 Nagios XI < 5.5.7 Privilege Escalation via MRTG Graphing Component — XI 7.8AIHighAI2025-10-30
CVE-2021-47700 Nagios XI < 5.8.7 Insecure Permissions on Highcharts Temporary Directory — XI 7.8AIHighAI2025-10-30
CVE-2025-34274 Nagios Log Server < 2024R2.0.3 Logstash Process Root Privileges — Log Server 8.8AIHighAI2025-10-30
CVE-2025-36137 IBM Sterling Connect:Direct for UNIX command execution — Sterling Connect:Direct for Unix 7.2 High2025-10-30
CVE-2025-62402 Apache Airflow: Airflow 3 API: /api/v2/dagReports executes DAG Python in API — Apache Airflow 8.0AIHighAI2025-10-30
CVE-2025-62503 Apache Airflow: Privilege boundary bypass in bulk APIs (create action can upsert existing Pools/Connections/Variables) — Apache Airflow 6.5AIMediumAI2025-10-30
CVE-2025-43017 HP ThinPro 8.1 SP8 Security Updates — HP ThinPro 8.1 9.4AICriticalAI2025-10-28
CVE-2025-6949 Moxa多款产品 安全漏洞 — EDR-G9010 Series 8.8AIHighAI2025-10-17
CVE-2025-6894 Moxa多款产品 安全漏洞 — EDR-G9010 Series 6.4AIMediumAI2025-10-17
CVE-2025-6893 Moxa多款产品 安全漏洞 — EDR-G9010 Series 8.1AIHighAI2025-10-17
CVE-2025-34515 Ilevia EVE X1 Server 4.7.18.0.eden Root Privilege Escalation — EVE X1 Server 9.8AICriticalAI2025-10-16
CVE-2025-61909 Icinga 2 signals sent as root to processes based on PID file written by the Icinga 2 daemon user — icinga2 3.3AILowAI2025-10-16
CVE-2025-57780 F5OS Vulnerability — F5OS - Appliance 7.8 High2025-10-15
CVE-2025-8486 Lenovo PC Manager 安全漏洞 — PC Manager 7.8 High2025-10-15
CVE-2025-59481 BIG-IP iControl REST and tmsh vulnerability — BIG-IP 6.5 Medium2025-10-15
CVE-2025-61958 BIG-IP TMSH vulnerability — BIG-IP 6.5 Medium2025-10-15
CVE-2025-36356 IBM Security Verify Access privilege escalation — Security Verify Access Appliance 9.3 Critical2025-10-06
CVE-2025-58432 ZimaOS Privilege Escalation using localhost calls to File API Upload — ZimaOS 7.8AIHighAI2025-09-17

Vulnerabilities classified as CWE-250 (带着不必要的权限执行) represent 236 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.