Description

flaskBlog is a blog app built with Flask. In 2.8.0 and earlier, the code checks if the userRole is "admin" only when visiting the /admin page, but not when visiting its subroutes. Specifically, only the file routes/adminPanel.py checks the user role when a user is trying to access the admin page, but that control is not done for the pages routes/adminPanelComments.py and routes/adminPanelPosts.py. Thus, an unauthorized user can bypass the intended restrictions, leaking sensitive data and accessing the following pages: /admin/posts, /adminpanel/posts, /admin/comments, and /adminpanel/comments.

INFO

Published Date :

2025-08-19T18:38:04.355Z

Last Modified :

2025-08-19T19:22:37.704Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2025-55734 vulnerability.

Vendors Products
Dogukanurker
  • Flaskblog
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-55734.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability