CVE-2023-45210: Improper access control in Implem Inc. Pleasanter
Pleasanter 1.3.47.0 and earlier contains an improper access control vulnerability, which may allow a remote authenticated attacker to view the temporary files uploaded by other users who are not permitted to access.
AI Analysis
Technical Summary
CVE-2023-45210 is an improper access control vulnerability identified in Implem Inc.'s Pleasanter product, specifically affecting versions 1.3.47.0 and earlier. Pleasanter is a collaborative platform often used for project management and workflow organization. The vulnerability allows a remote attacker who has authenticated access to the system to view temporary files uploaded by other users, even if those users are not authorized to access those files. This issue arises due to insufficient enforcement of access control policies on temporary file storage, categorized under CWE-284 (Improper Access Control). The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. According to the CVSS v3.1 scoring, it has a base score of 4.3 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and limited confidentiality impact (C:L), with no impact on integrity or availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability primarily compromises confidentiality by exposing potentially sensitive temporary files to unauthorized authenticated users, which could lead to information leakage or privacy violations within organizations using Pleasanter.
Potential Impact
For European organizations using Pleasanter, this vulnerability poses a risk of unauthorized disclosure of sensitive or confidential information contained in temporary uploaded files. Since the attacker must be authenticated, the threat is mainly from insider threats or compromised user accounts. The exposure of temporary files could lead to leakage of intellectual property, personal data protected under GDPR, or other sensitive business information. This could result in reputational damage, regulatory penalties, and loss of trust. The impact is particularly significant for sectors handling sensitive data such as finance, healthcare, legal, and government institutions within Europe. Although the vulnerability does not affect system integrity or availability, the confidentiality breach alone can have serious compliance and operational consequences under European data protection laws.
Mitigation Recommendations
European organizations should immediately review their use of Pleasanter and identify if they are running affected versions (1.3.47.0 or earlier). Until an official patch is released, organizations should implement strict access controls at the network and application layers, including limiting authenticated user privileges to the minimum necessary. Monitoring and logging access to temporary file storage areas should be enhanced to detect unauthorized access attempts. Organizations should also consider isolating the Pleasanter environment and restricting upload and file sharing functionalities to trusted users only. Regular audits of user permissions and session management should be conducted to reduce the risk of compromised accounts. Additionally, organizations should engage with Implem Inc. for updates on patches or workarounds and plan for timely application of fixes once available. Employing Data Loss Prevention (DLP) tools to monitor and control sensitive data exposure through temporary files can also mitigate risks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2023-45210: Improper access control in Implem Inc. Pleasanter
Description
Pleasanter 1.3.47.0 and earlier contains an improper access control vulnerability, which may allow a remote authenticated attacker to view the temporary files uploaded by other users who are not permitted to access.
AI-Powered Analysis
Technical Analysis
CVE-2023-45210 is an improper access control vulnerability identified in Implem Inc.'s Pleasanter product, specifically affecting versions 1.3.47.0 and earlier. Pleasanter is a collaborative platform often used for project management and workflow organization. The vulnerability allows a remote attacker who has authenticated access to the system to view temporary files uploaded by other users, even if those users are not authorized to access those files. This issue arises due to insufficient enforcement of access control policies on temporary file storage, categorized under CWE-284 (Improper Access Control). The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. According to the CVSS v3.1 scoring, it has a base score of 4.3 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and limited confidentiality impact (C:L), with no impact on integrity or availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability primarily compromises confidentiality by exposing potentially sensitive temporary files to unauthorized authenticated users, which could lead to information leakage or privacy violations within organizations using Pleasanter.
Potential Impact
For European organizations using Pleasanter, this vulnerability poses a risk of unauthorized disclosure of sensitive or confidential information contained in temporary uploaded files. Since the attacker must be authenticated, the threat is mainly from insider threats or compromised user accounts. The exposure of temporary files could lead to leakage of intellectual property, personal data protected under GDPR, or other sensitive business information. This could result in reputational damage, regulatory penalties, and loss of trust. The impact is particularly significant for sectors handling sensitive data such as finance, healthcare, legal, and government institutions within Europe. Although the vulnerability does not affect system integrity or availability, the confidentiality breach alone can have serious compliance and operational consequences under European data protection laws.
Mitigation Recommendations
European organizations should immediately review their use of Pleasanter and identify if they are running affected versions (1.3.47.0 or earlier). Until an official patch is released, organizations should implement strict access controls at the network and application layers, including limiting authenticated user privileges to the minimum necessary. Monitoring and logging access to temporary file storage areas should be enhanced to detect unauthorized access attempts. Organizations should also consider isolating the Pleasanter environment and restricting upload and file sharing functionalities to trusted users only. Regular audits of user permissions and session management should be conducted to reduce the risk of compromised accounts. Additionally, organizations should engage with Implem Inc. for updates on patches or workarounds and plan for timely application of fixes once available. Employing Data Loss Prevention (DLP) tools to monitor and control sensitive data exposure through temporary files can also mitigate risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jpcert
- Date Reserved
- 2023-10-31T01:54:11.551Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683732d3182aa0cae25301e1
Added to database: 5/28/2025, 3:59:15 PM
Last enriched: 7/7/2025, 8:13:34 AM
Last updated: 8/19/2025, 1:53:37 AM
Views: 19
Related Threats
CVE-2025-8782
UnknownCVE-2025-9145: Cross Site Scripting in Scada-LTS
MediumCVE-2025-9144: Cross Site Scripting in Scada-LTS
MediumCVE-2025-9143: Cross Site Scripting in Scada-LTS
MediumCVE-2025-50897: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.