Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13474: CWE-639 Authorization Bypass Through User-Controlled Key in Menulux Software Inc. Mobile App

0
High
VulnerabilityCVE-2025-13474cvecve-2025-13474cwe-639
Published: Tue Dec 16 2025 (12/16/2025, 11:25:49 UTC)
Source: CVE Database V5
Vendor/Project: Menulux Software Inc.
Product: Mobile App

Description

Authorization Bypass Through User-Controlled Key vulnerability in Menulux Software Inc. Mobile App allows Exploitation of Trusted Identifiers.This issue affects Mobile App: before 9.5.8.

AI-Powered Analysis

AILast updated: 12/16/2025, 11:47:37 UTC

Technical Analysis

CVE-2025-13474 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the Menulux Software Inc. mobile application prior to version 9.5.8. The vulnerability stems from the app's failure to properly validate or restrict user-controlled keys used as trusted identifiers within its authorization logic. This flaw allows an unauthenticated remote attacker to manipulate these keys to gain unauthorized access to protected resources or data, bypassing normal authorization checks. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, increasing its risk profile. The CVSS v3.1 base score of 7.5 reflects the ease of exploitation combined with a high impact on confidentiality, as sensitive user or business data could be exposed. However, the vulnerability does not impact data integrity or system availability. No public exploits have been reported yet, but the vulnerability is published and should be considered a significant risk for users of affected app versions. The lack of available patches at the time of reporting necessitates urgent vendor response and user mitigation.

Potential Impact

For European organizations, this vulnerability poses a significant risk of unauthorized data disclosure, potentially exposing sensitive customer or business information managed through the Menulux mobile app. Sectors such as hospitality, retail, or any industry relying on Menulux solutions for mobile ordering or service management could face confidentiality breaches. This could lead to regulatory compliance issues under GDPR due to unauthorized access to personal data, reputational damage, and potential financial losses. Since the vulnerability does not affect integrity or availability, operational disruption is less likely, but the confidentiality impact alone warrants urgent attention. The remote, unauthenticated nature of the exploit increases the likelihood of attacks, especially in environments where the app is widely deployed and network access is available.

Mitigation Recommendations

1. Immediately update the Menulux mobile app to version 9.5.8 or later once available, as this version addresses the authorization bypass issue. 2. Until patching is possible, restrict network access to the app’s backend services using network segmentation and firewall rules to limit exposure. 3. Conduct a thorough review and audit of authorization mechanisms within the app, focusing on the handling of user-controlled keys and trusted identifiers to ensure proper validation and access controls. 4. Implement monitoring and alerting for unusual access patterns or unauthorized data access attempts related to the app. 5. Educate users and administrators about the risk and encourage prompt application updates. 6. Coordinate with Menulux Software Inc. for timely patches and security advisories. 7. Consider deploying additional application-layer security controls such as Web Application Firewalls (WAF) to detect and block exploitation attempts targeting authorization logic.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
TR-CERT
Date Reserved
2025-11-20T12:01:32.797Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694144fdb7167ed5be7864c9

Added to database: 12/16/2025, 11:39:41 AM

Last enriched: 12/16/2025, 11:47:37 AM

Last updated: 12/16/2025, 8:21:54 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats