Vulnerability Details CVE-2024-25723
ZenML Server in the ZenML machine learning package before 0.46.7 for Python allows remote privilege escalation because the /api/v1/users/{user_name_or_id}/activate REST API endpoint allows access on the basis of a valid username along with a new password in the request body. These are also patched versions: 0.44.4, 0.43.1, and 0.42.2.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.896
EPSS Ranking 99.5%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2024-25723
-
-
cpe:2.3:a:zenml:zenml:0.1.0
-
cpe:2.3:a:zenml:zenml:0.1.1
-
cpe:2.3:a:zenml:zenml:0.1.2
-
cpe:2.3:a:zenml:zenml:0.1.3
-
cpe:2.3:a:zenml:zenml:0.1.4
-
cpe:2.3:a:zenml:zenml:0.1.5
-
cpe:2.3:a:zenml:zenml:0.10.0
-
cpe:2.3:a:zenml:zenml:0.11.0
-
cpe:2.3:a:zenml:zenml:0.12.0
-
cpe:2.3:a:zenml:zenml:0.13.0
-
cpe:2.3:a:zenml:zenml:0.13.1
-
cpe:2.3:a:zenml:zenml:0.13.2
-
cpe:2.3:a:zenml:zenml:0.2.0
-
cpe:2.3:a:zenml:zenml:0.20.0
-
cpe:2.3:a:zenml:zenml:0.20.1
-
cpe:2.3:a:zenml:zenml:0.20.2
-
cpe:2.3:a:zenml:zenml:0.20.3
-
cpe:2.3:a:zenml:zenml:0.20.4
-
cpe:2.3:a:zenml:zenml:0.20.5
-
cpe:2.3:a:zenml:zenml:0.21.0
-
cpe:2.3:a:zenml:zenml:0.21.1
-
cpe:2.3:a:zenml:zenml:0.22.0
-
cpe:2.3:a:zenml:zenml:0.23.0
-
cpe:2.3:a:zenml:zenml:0.3.0
-
cpe:2.3:a:zenml:zenml:0.3.1
-
cpe:2.3:a:zenml:zenml:0.3.2
-
cpe:2.3:a:zenml:zenml:0.3.3
-
cpe:2.3:a:zenml:zenml:0.3.4
-
cpe:2.3:a:zenml:zenml:0.3.5
-
cpe:2.3:a:zenml:zenml:0.3.6
-
cpe:2.3:a:zenml:zenml:0.3.6.1
-
cpe:2.3:a:zenml:zenml:0.3.7
-
cpe:2.3:a:zenml:zenml:0.3.7.1
-
cpe:2.3:a:zenml:zenml:0.3.8
-
cpe:2.3:a:zenml:zenml:0.3.9
-
cpe:2.3:a:zenml:zenml:0.30.0
-
cpe:2.3:a:zenml:zenml:0.31.0
-
cpe:2.3:a:zenml:zenml:0.31.1
-
cpe:2.3:a:zenml:zenml:0.32.0
-
cpe:2.3:a:zenml:zenml:0.32.1
-
cpe:2.3:a:zenml:zenml:0.33.0
-
cpe:2.3:a:zenml:zenml:0.34.0
-
cpe:2.3:a:zenml:zenml:0.35.0
-
cpe:2.3:a:zenml:zenml:0.35.1
-
cpe:2.3:a:zenml:zenml:0.36.0
-
cpe:2.3:a:zenml:zenml:0.36.1
-
cpe:2.3:a:zenml:zenml:0.37.0
-
cpe:2.3:a:zenml:zenml:0.38.0
-
cpe:2.3:a:zenml:zenml:0.39.0
-
cpe:2.3:a:zenml:zenml:0.39.1
-
cpe:2.3:a:zenml:zenml:0.40.0
-
cpe:2.3:a:zenml:zenml:0.40.1
-
cpe:2.3:a:zenml:zenml:0.40.2
-
cpe:2.3:a:zenml:zenml:0.40.3
-
cpe:2.3:a:zenml:zenml:0.41.0
-
cpe:2.3:a:zenml:zenml:0.42.0
-
cpe:2.3:a:zenml:zenml:0.42.1
-
cpe:2.3:a:zenml:zenml:0.43.0
-
cpe:2.3:a:zenml:zenml:0.44.0
-
cpe:2.3:a:zenml:zenml:0.44.1
-
cpe:2.3:a:zenml:zenml:0.44.2
-
cpe:2.3:a:zenml:zenml:0.44.3
-
cpe:2.3:a:zenml:zenml:0.45.0
-
cpe:2.3:a:zenml:zenml:0.45.1
-
cpe:2.3:a:zenml:zenml:0.45.2
-
cpe:2.3:a:zenml:zenml:0.45.3
-
cpe:2.3:a:zenml:zenml:0.45.4
-
cpe:2.3:a:zenml:zenml:0.45.5
-
cpe:2.3:a:zenml:zenml:0.45.6
-
cpe:2.3:a:zenml:zenml:0.46.0
-
cpe:2.3:a:zenml:zenml:0.46.1
-
cpe:2.3:a:zenml:zenml:0.5.0
-
cpe:2.3:a:zenml:zenml:0.5.1
-
cpe:2.3:a:zenml:zenml:0.5.2
-
cpe:2.3:a:zenml:zenml:0.5.3
-
cpe:2.3:a:zenml:zenml:0.5.4
-
cpe:2.3:a:zenml:zenml:0.5.5
-
cpe:2.3:a:zenml:zenml:0.5.6
-
cpe:2.3:a:zenml:zenml:0.5.7
-
cpe:2.3:a:zenml:zenml:0.6.0
-
cpe:2.3:a:zenml:zenml:0.6.1
-
cpe:2.3:a:zenml:zenml:0.6.2
-
cpe:2.3:a:zenml:zenml:0.6.3
-
cpe:2.3:a:zenml:zenml:0.7.0
-
cpe:2.3:a:zenml:zenml:0.7.1
-
cpe:2.3:a:zenml:zenml:0.7.2
-
cpe:2.3:a:zenml:zenml:0.7.3
-
cpe:2.3:a:zenml:zenml:0.8.0
-
cpe:2.3:a:zenml:zenml:0.8.1
-
cpe:2.3:a:zenml:zenml:0.9.0