Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0875: CWE-639 Authorization Bypass Through User-Controlled Key in PROLIZ Computer Software Hardware Service Trade Ltd. Co. OBS (Student Affairs Information System)

0
Medium
VulnerabilityCVE-2025-0875cvecve-2025-0875cwe-639
Published: Mon Sep 22 2025 (09/22/2025, 08:02:09 UTC)
Source: CVE Database V5
Vendor/Project: PROLIZ Computer Software Hardware Service Trade Ltd. Co.
Product: OBS (Student Affairs Information System)

Description

Authorization Bypass Through User-Controlled Key vulnerability in PROLIZ Computer Software Hardware Service Trade Ltd. Co. OBS (Student Affairs Information System) allows Parameter Injection.This issue affects OBS (Student Affairs Information System): before v26.0328.

AI-Powered Analysis

AILast updated: 09/22/2025, 08:08:34 UTC

Technical Analysis

CVE-2025-0875 is an authorization bypass vulnerability identified in the OBS (Student Affairs Information System) developed by PROLIZ Computer Software Hardware Service Trade Ltd. Co. This vulnerability is categorized under CWE-639, which pertains to authorization bypass through a user-controlled key. Specifically, the issue allows an attacker to perform parameter injection by manipulating keys that control authorization logic within the system. The affected versions are those prior to v26.0328. The vulnerability enables an attacker with certain privileges to bypass authorization controls, potentially gaining unauthorized access to sensitive student affairs data or functions. According to the CVSS 3.1 vector (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N), exploitation requires network access, high attack complexity, privileges, and user interaction, with a significant impact on confidentiality but no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may rely on vendor updates or configuration changes once available.

Potential Impact

For European organizations, particularly educational institutions and administrative bodies using the OBS Student Affairs Information System, this vulnerability poses a risk of unauthorized data disclosure. The confidentiality impact is high, meaning sensitive student information such as personal data, academic records, or disciplinary actions could be exposed to unauthorized users. Although the vulnerability does not affect data integrity or system availability, the breach of confidentiality can lead to privacy violations, regulatory non-compliance (e.g., GDPR), reputational damage, and potential legal consequences. The requirement for privileges and user interaction reduces the likelihood of widespread exploitation but does not eliminate the risk, especially in environments where insider threats or social engineering attacks are possible. Given the critical nature of student data and strict data protection regulations in Europe, this vulnerability warrants prompt attention.

Mitigation Recommendations

Organizations should first verify if they are running affected versions of the OBS Student Affairs Information System prior to v26.0328. Immediate mitigation steps include: 1) Restricting network access to the OBS system to trusted internal networks and enforcing strong authentication and authorization policies to limit privilege escalation. 2) Implementing strict input validation and parameter sanitization at the application layer to prevent parameter injection attacks. 3) Conducting user training to reduce the risk of social engineering that could facilitate user interaction required for exploitation. 4) Monitoring logs and access patterns for unusual activity indicative of authorization bypass attempts. 5) Engaging with the vendor for timely patches or updates and applying them as soon as they become available. 6) Reviewing and tightening role-based access controls within the system to minimize the impact of any potential bypass. These measures go beyond generic advice by focusing on access restriction, input validation, and proactive monitoring tailored to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
TR-CERT
Date Reserved
2025-01-30T11:24:17.758Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d103c34b809de657261e0c

Added to database: 9/22/2025, 8:07:31 AM

Last enriched: 9/22/2025, 8:08:34 AM

Last updated: 10/7/2025, 7:44:17 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats