Improper Privilege Management
baserCMS versions through 3.0.15 and 4.0.0 through 18.104.22.168, allow remote authenticated attackers to bypass access restrictions to view or alter restricted content via unspecified vectors.
CWE-269 - Improper Privilege Management
An effective privilege management infrastructure provides valid users with required access and privileges across heterogeneous technology environments. An application with a faulty privilege management infrastructure allows higher than authorized privileges or enables privilege escalation. This can lead to security incidents such as system infiltration, data breach, and complete system takeover.