CVE-2025-64067

Primakon Pi Portal 1.0.18 API endpoints responsible for retrieving object-specific or filtered data (e.g., user profiles, project records) fail to implement sufficient server-side validation to confirm that the requesting user is authorized to access the requested object or dataset. This vulnerability can be exploited in two ways: Direct ID manipulation and IDOR, by changing an ID parameter (e.g., user_id, project_id) in the request, an attacker can access the object and data belonging to another user; and filter Omission, by omitting the filtering parameter entirely, an attacker can cause the endpoint to return an entire unfiltered dataset of all stored records for all users. This flaw leads to the unauthorized exposure of sensitive personal and organizational information.
Configurations

No configuration.

History

25 Nov 2025, 21:15

Type Values Removed Values Added
CWE CWE-639
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3

25 Nov 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-25 19:15

Updated : 2025-11-25 22:16


NVD link : CVE-2025-64067

Mitre link : CVE-2025-64067

CVE.ORG link : CVE-2025-64067


JSON object : View

Products Affected

No product.

CWE
CWE-639

Authorization Bypass Through User-Controlled Key