Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10912: CWE-639 Authorization Bypass Through User-Controlled Key in Saastech Cleaning and Internet Services Inc. TemizlikYolda

0
Medium
VulnerabilityCVE-2025-10912cvecve-2025-10912cwe-639
Published: Wed Feb 11 2026 (02/11/2026, 07:54:11 UTC)
Source: CVE Database V5
Vendor/Project: Saastech Cleaning and Internet Services Inc.
Product: TemizlikYolda

Description

Authorization Bypass Through User-Controlled Key vulnerability in Saastech Cleaning and Internet Services Inc. TemizlikYolda allows Manipulating User-Controlled Variables.This issue affects TemizlikYolda: through 11022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 00:21:21 UTC

Technical Analysis

CVE-2025-10912 is categorized under CWE-639, which involves authorization bypass through user-controlled keys. In the TemizlikYolda product by Saastech Cleaning and Internet Services Inc., the vulnerability allows an attacker to manipulate user-controlled variables that influence authorization decisions. Specifically, the application fails to properly validate or restrict keys that control access permissions, enabling an attacker with some level of privilege (PR:L) to escalate their authorization or perform unauthorized actions. The vulnerability is remotely exploitable (AV:N) without requiring user interaction (UI:N), and the attack complexity is low (AC:L). The impact affects integrity and availability but not confidentiality, as per the CVSS vector. The vendor has been contacted but has not issued any response or patch, leaving the vulnerability unmitigated. This lack of vendor response increases the risk for organizations relying on this software, as attackers could develop exploits over time. The affected versions are indicated as '0', which likely means all current versions up to the date of disclosure are vulnerable. The vulnerability's exploitation could allow unauthorized modification or disruption of services provided by TemizlikYolda, which is presumably used in cleaning and internet services management.

Potential Impact

The primary impact of this vulnerability is unauthorized modification of data or disruption of service availability within the TemizlikYolda platform. Organizations using this software may face integrity violations where attackers can perform actions beyond their authorized scope, potentially leading to service interruptions or manipulation of operational data. Since the vulnerability does not affect confidentiality, sensitive data exposure risk is low. However, the ability to bypass authorization controls can undermine trust in the system and cause operational disruptions. Given the vendor's lack of response and absence of patches, the risk of exploitation may increase over time, especially if threat actors develop proof-of-concept exploits. This could affect organizations relying on TemizlikYolda for operational management, leading to potential financial losses, reputational damage, and operational inefficiencies.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict access controls and monitor user activities closely within TemizlikYolda. Limit user privileges to the minimum necessary to reduce the risk of privilege escalation through this vulnerability. Employ network segmentation to isolate the TemizlikYolda system from critical infrastructure and sensitive data. Implement application-layer firewalls or intrusion detection systems to detect anomalous requests that may attempt to manipulate user-controlled keys. Regularly audit logs for unusual authorization changes or access patterns. Engage with Saastech Cleaning and Internet Services Inc. for updates and encourage them to provide a timely patch. If feasible, consider temporary alternative solutions or manual controls to mitigate risks associated with unauthorized actions. Finally, educate users and administrators about the vulnerability and the importance of vigilance until remediation is available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TR-CERT
Date Reserved
2025-09-24T12:45:45.392Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698c374b4b57a58fa17fe935

Added to database: 2/11/2026, 8:01:15 AM

Last enriched: 3/26/2026, 12:21:21 AM

Last updated: 3/28/2026, 11:42:02 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses