Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13829: CWE-863 Incorrect Authorization in Data Illusion Zumbrunn NGSurvey

0
High
VulnerabilityCVE-2025-13829cvecve-2025-13829cwe-863
Published: Mon Dec 01 2025 (12/01/2025, 15:47:10 UTC)
Source: CVE Database V5
Vendor/Project: Data Illusion Zumbrunn
Product: NGSurvey

Description

Incorrect Authorization vulnerability in Data Illusion Zumbrunn NGSurvey allows any logged-in user to obtain the private information of any other user. Critical information retrieved: * APIKEY (1 year user Session) * RefreshToken (10 minutes user Session) * Password hashed with bcrypt * User IP * Email * Full Name

AI-Powered Analysis

AILast updated: 12/01/2025, 16:20:07 UTC

Technical Analysis

CVE-2025-13829 is an incorrect authorization vulnerability (CWE-863) identified in Data Illusion Zumbrunn's NGSurvey product, specifically affecting version 0. The flaw allows any authenticated user to retrieve private information belonging to other users without proper authorization checks. The compromised data includes highly sensitive credentials such as API keys that grant one-year user sessions, refresh tokens valid for 10 minutes, bcrypt-hashed passwords, user IP addresses, email addresses, and full names. The vulnerability requires no user interaction and can be exploited remotely over the network with low attack complexity and no privileges beyond a valid login session. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/AU:Y) indicates network attack vector, low complexity, no attack or user interaction needed, partial impact on confidentiality and integrity, and requires authentication. Although no public exploits are currently known, the exposure of long-lived API keys and refresh tokens significantly increases the risk of session hijacking and lateral movement within affected environments. The vulnerability undermines the confidentiality and integrity of user data and could lead to unauthorized access, data leakage, and potential privilege escalation. The lack of available patches necessitates immediate compensating controls and monitoring.

Potential Impact

For European organizations, this vulnerability presents a critical risk to user privacy and data security, especially for entities relying on NGSurvey for sensitive data collection and analysis. Exposure of API keys and refresh tokens can enable attackers to impersonate users or maintain persistent access, leading to data breaches and compliance violations under GDPR. The disclosure of bcrypt-hashed passwords, while hashed, still poses a risk if attackers can perform offline cracking attempts. The leakage of personal identifiable information (PII) such as emails, full names, and IP addresses can facilitate targeted phishing, social engineering, and further attacks. Organizations may suffer reputational damage, regulatory penalties, and operational disruptions. The vulnerability's ease of exploitation and broad impact on confidentiality and integrity make it a significant threat to European companies, especially those in sectors like research, healthcare, and government that handle sensitive survey data.

Mitigation Recommendations

1. Immediately restrict access to NGSurvey to trusted users and networks until a patch is available. 2. Implement strict role-based access control (RBAC) and enforce least privilege principles to limit user permissions. 3. Conduct thorough code reviews and add robust authorization checks to ensure users can only access their own data. 4. Rotate all API keys and refresh tokens to invalidate potentially compromised credentials. 5. Enhance monitoring and logging to detect unusual access patterns or data exfiltration attempts. 6. Educate users about phishing risks that may arise from leaked PII. 7. If possible, isolate NGSurvey instances and segment networks to contain potential breaches. 8. Engage with the vendor for timely patch releases and apply updates promptly once available. 9. Consider multi-factor authentication (MFA) to reduce the risk of unauthorized access using stolen credentials. 10. Perform regular penetration testing and vulnerability assessments focusing on authorization controls.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
TCS-CERT
Date Reserved
2025-12-01T15:30:15.569Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692dbca6f910530b0eb80dfc

Added to database: 12/1/2025, 4:04:54 PM

Last enriched: 12/1/2025, 4:20:07 PM

Last updated: 12/4/2025, 5:32:45 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats