CVE-2025-0875: CWE-639 Authorization Bypass Through User-Controlled Key in PROLIZ Computer Software Hardware Service Trade Ltd. Co. OBS (Student Affairs Information System)
Authorization Bypass Through User-Controlled Key vulnerability in PROLIZ Computer Software Hardware Service Trade Ltd. Co. OBS (Student Affairs Information System) allows Parameter Injection.This issue affects OBS (Student Affairs Information System): before v26.0328.
AI Analysis
Technical Summary
CVE-2025-0875 is an authorization bypass vulnerability identified in the OBS (Student Affairs Information System) developed by PROLIZ Computer Software Hardware Service Trade Ltd. Co. This vulnerability is categorized under CWE-639, which pertains to authorization bypass through a user-controlled key. Specifically, the issue allows an attacker to perform parameter injection by manipulating keys that control authorization logic within the system. The affected versions are those prior to v26.0328. The vulnerability enables an attacker with certain privileges to bypass authorization controls, potentially gaining unauthorized access to sensitive student affairs data or functions. According to the CVSS 3.1 vector (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N), exploitation requires network access, high attack complexity, privileges, and user interaction, with a significant impact on confidentiality but no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may rely on vendor updates or configuration changes once available.
Potential Impact
For European organizations, particularly educational institutions and administrative bodies using the OBS Student Affairs Information System, this vulnerability poses a risk of unauthorized data disclosure. The confidentiality impact is high, meaning sensitive student information such as personal data, academic records, or disciplinary actions could be exposed to unauthorized users. Although the vulnerability does not affect data integrity or system availability, the breach of confidentiality can lead to privacy violations, regulatory non-compliance (e.g., GDPR), reputational damage, and potential legal consequences. The requirement for privileges and user interaction reduces the likelihood of widespread exploitation but does not eliminate the risk, especially in environments where insider threats or social engineering attacks are possible. Given the critical nature of student data and strict data protection regulations in Europe, this vulnerability warrants prompt attention.
Mitigation Recommendations
Organizations should first verify if they are running affected versions of the OBS Student Affairs Information System prior to v26.0328. Immediate mitigation steps include: 1) Restricting network access to the OBS system to trusted internal networks and enforcing strong authentication and authorization policies to limit privilege escalation. 2) Implementing strict input validation and parameter sanitization at the application layer to prevent parameter injection attacks. 3) Conducting user training to reduce the risk of social engineering that could facilitate user interaction required for exploitation. 4) Monitoring logs and access patterns for unusual activity indicative of authorization bypass attempts. 5) Engaging with the vendor for timely patches or updates and applying them as soon as they become available. 6) Reviewing and tightening role-based access controls within the system to minimize the impact of any potential bypass. These measures go beyond generic advice by focusing on access restriction, input validation, and proactive monitoring tailored to the nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-0875: CWE-639 Authorization Bypass Through User-Controlled Key in PROLIZ Computer Software Hardware Service Trade Ltd. Co. OBS (Student Affairs Information System)
Description
Authorization Bypass Through User-Controlled Key vulnerability in PROLIZ Computer Software Hardware Service Trade Ltd. Co. OBS (Student Affairs Information System) allows Parameter Injection.This issue affects OBS (Student Affairs Information System): before v26.0328.
AI-Powered Analysis
Technical Analysis
CVE-2025-0875 is an authorization bypass vulnerability identified in the OBS (Student Affairs Information System) developed by PROLIZ Computer Software Hardware Service Trade Ltd. Co. This vulnerability is categorized under CWE-639, which pertains to authorization bypass through a user-controlled key. Specifically, the issue allows an attacker to perform parameter injection by manipulating keys that control authorization logic within the system. The affected versions are those prior to v26.0328. The vulnerability enables an attacker with certain privileges to bypass authorization controls, potentially gaining unauthorized access to sensitive student affairs data or functions. According to the CVSS 3.1 vector (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N), exploitation requires network access, high attack complexity, privileges, and user interaction, with a significant impact on confidentiality but no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may rely on vendor updates or configuration changes once available.
Potential Impact
For European organizations, particularly educational institutions and administrative bodies using the OBS Student Affairs Information System, this vulnerability poses a risk of unauthorized data disclosure. The confidentiality impact is high, meaning sensitive student information such as personal data, academic records, or disciplinary actions could be exposed to unauthorized users. Although the vulnerability does not affect data integrity or system availability, the breach of confidentiality can lead to privacy violations, regulatory non-compliance (e.g., GDPR), reputational damage, and potential legal consequences. The requirement for privileges and user interaction reduces the likelihood of widespread exploitation but does not eliminate the risk, especially in environments where insider threats or social engineering attacks are possible. Given the critical nature of student data and strict data protection regulations in Europe, this vulnerability warrants prompt attention.
Mitigation Recommendations
Organizations should first verify if they are running affected versions of the OBS Student Affairs Information System prior to v26.0328. Immediate mitigation steps include: 1) Restricting network access to the OBS system to trusted internal networks and enforcing strong authentication and authorization policies to limit privilege escalation. 2) Implementing strict input validation and parameter sanitization at the application layer to prevent parameter injection attacks. 3) Conducting user training to reduce the risk of social engineering that could facilitate user interaction required for exploitation. 4) Monitoring logs and access patterns for unusual activity indicative of authorization bypass attempts. 5) Engaging with the vendor for timely patches or updates and applying them as soon as they become available. 6) Reviewing and tightening role-based access controls within the system to minimize the impact of any potential bypass. These measures go beyond generic advice by focusing on access restriction, input validation, and proactive monitoring tailored to the nature of this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- TR-CERT
- Date Reserved
- 2025-01-30T11:24:17.758Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d103c34b809de657261e0c
Added to database: 9/22/2025, 8:07:31 AM
Last enriched: 9/22/2025, 8:08:34 AM
Last updated: 10/7/2025, 7:44:17 AM
Views: 25
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11357: SQL Injection in code-projects Simple Banking System
MediumCVE-2025-7400: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-11355: Buffer Overflow in UTT 1250GW
HighCVE-2025-11356: Buffer Overflow in Tenda AC23
HighCVE-2025-11354: Unrestricted Upload in code-projects Online Hotel Reservation System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.