Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10947: Authorization Bypass in Sistemas Pleno Gestão de Locação

0
Medium
VulnerabilityCVE-2025-10947cvecve-2025-10947
Published: Thu Sep 25 2025 (09/25/2025, 13:02:09 UTC)
Source: CVE Database V5
Vendor/Project: Sistemas Pleno
Product: Gestão de Locação

Description

A flaw has been found in Sistemas Pleno Gestão de Locação up to 2025.7.x. The impacted element is an unknown function of the file /api/areacliente/pessoa/validarCpf of the component CPF Handler. Executing a manipulation of the argument pes_cpf can lead to authorization bypass. The attack can be executed remotely. The exploit has been published and may be used. Upgrading to version 2025.8.0 is sufficient to resolve this issue. It is advisable to upgrade the affected component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 00:29:39 UTC

Technical Analysis

CVE-2025-10947 is a medium-severity authorization bypass vulnerability affecting Sistemas Pleno Gestão de Locação software versions 2025.0 through 2025.7. The vulnerability resides in an unspecified function within the /api/areacliente/pessoa/validarCpf API endpoint, part of the CPF Handler component. By manipulating the pes_cpf parameter, an attacker can bypass authorization checks, gaining unauthorized access to protected resources or functionality. The attack can be performed remotely over the network without requiring authentication or user interaction, making exploitation relatively straightforward. The vulnerability does not impact confidentiality, integrity, or availability directly but compromises access control, potentially exposing sensitive client information or allowing unauthorized operations. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P) indicates an exploit is publicly available and the attack complexity is low. No known exploits in the wild have been reported yet, but the published exploit code increases the likelihood of active exploitation. The vendor has addressed the issue in version 2025.8.0, and upgrading is the recommended remediation. Given the nature of the vulnerability, it is critical for organizations using this software to apply the patch promptly to prevent unauthorized access and potential data breaches.

Potential Impact

The primary impact of CVE-2025-10947 is unauthorized access due to bypassed authorization controls, which can lead to exposure of sensitive client data or unauthorized operations within the Sistemas Pleno Gestão de Locação platform. This can result in data confidentiality breaches, potential privacy violations, and operational disruptions if unauthorized users manipulate rental management functions. Since the vulnerability requires no authentication or user interaction and can be exploited remotely, the attack surface is broad, increasing risk for all exposed instances. Organizations relying on this software for rental management may face reputational damage, regulatory penalties, and financial losses if exploited. The medium severity rating reflects the moderate but significant risk posed by this vulnerability, especially in environments with sensitive client data or critical business processes. The availability of public exploit code further elevates the threat, necessitating urgent remediation.

Mitigation Recommendations

1. Immediately upgrade Sistemas Pleno Gestão de Locação to version 2025.8.0 or later, as this update contains the fix for the authorization bypass vulnerability. 2. If immediate upgrade is not possible, implement network-level access controls to restrict access to the /api/areacliente/pessoa/validarCpf endpoint, limiting it to trusted IP addresses or VPN users. 3. Monitor logs for unusual or unauthorized access attempts targeting the pes_cpf parameter or the affected API endpoint. 4. Employ Web Application Firewalls (WAF) with custom rules to detect and block suspicious manipulations of the pes_cpf argument. 5. Conduct a thorough audit of user permissions and access controls within the application to ensure no excessive privileges exist that could be exploited. 6. Educate security and IT teams about this vulnerability and the importance of patching to prevent exploitation. 7. Review and enhance incident response plans to quickly address any signs of compromise related to this vulnerability. 8. Consider implementing multi-factor authentication and additional authorization layers where feasible to reduce risk from similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-25T06:01:51.197Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d53de3fd5656ece925daf1

Added to database: 9/25/2025, 1:04:35 PM

Last enriched: 3/26/2026, 12:29:39 AM

Last updated: 5/10/2026, 7:35:58 AM

Views: 117

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses