Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14317: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in Emaintenance Crazy Bubble Tea

0
High
VulnerabilityCVE-2025-14317cvecve-2025-14317cwe-359
Published: Wed Jan 14 2026 (01/14/2026, 13:28:02 UTC)
Source: CVE Database V5
Vendor/Project: Emaintenance
Product: Crazy Bubble Tea

Description

In Crazy Bubble Tea mobile application authenticated attacker can obtain personal information about other users by enumerating a `loyaltyGuestId` parameter. Server does not verify the permissions required to obtain the data. This issue was fixed in version 915 (Android) and 7.4.1 (iOS).

AI-Powered Analysis

AILast updated: 01/14/2026, 14:02:06 UTC

Technical Analysis

CVE-2025-14317 is a vulnerability classified under CWE-359 (Exposure of Private Personal Information to an Unauthorized Actor) found in the Emaintenance Crazy Bubble Tea mobile application. The issue arises because the server does not enforce proper authorization checks when processing requests containing the loyaltyGuestId parameter. An authenticated attacker can enumerate this parameter to retrieve personal information belonging to other users without possessing the necessary permissions. This vulnerability affects all versions prior to 915 on Android and 7.4.1 on iOS, where the flaw was fixed. The vulnerability’s CVSS 4.0 score is 7.1, indicating high severity, with an attack vector of network (remote exploitation), low attack complexity, no privileges required beyond authentication, and no user interaction needed. The vulnerability impacts confidentiality severely, as unauthorized actors can access sensitive personal data, but it does not affect integrity or availability. No known exploits have been reported in the wild to date. The root cause is insufficient server-side authorization validation, which allows attackers to bypass access controls by manipulating the loyaltyGuestId parameter. This type of vulnerability is particularly concerning in mobile applications that handle personal user data, especially in loyalty or rewards programs where personal and transactional information is stored. The fix involves updating the application to the patched versions and ensuring robust authorization checks on the server side to validate that the requesting user has the right to access the requested data. Organizations using this app should audit their user data access controls and monitor for suspicious enumeration activity.

Potential Impact

The primary impact of CVE-2025-14317 is the unauthorized disclosure of personal user information, which compromises confidentiality. For European organizations, this can lead to violations of GDPR and other data protection regulations, resulting in legal penalties and reputational damage. The exposure of personal data can facilitate identity theft, targeted phishing, and other social engineering attacks. Since the vulnerability requires only authentication but no elevated privileges or user interaction, it is relatively easy for attackers with valid accounts to exploit. This increases the risk of insider threats or credential stuffing attacks leading to data breaches. The vulnerability does not affect system integrity or availability, so operational disruption is unlikely. However, the loss of customer trust and potential regulatory fines could have significant financial and strategic consequences. Organizations relying on the Crazy Bubble Tea app for customer engagement or loyalty programs must prioritize remediation to protect user privacy and comply with European data protection laws.

Mitigation Recommendations

1. Immediately update the Crazy Bubble Tea mobile application to version 915 (Android) or 7.4.1 (iOS) or later to apply the official fix. 2. Conduct a thorough audit of server-side authorization logic to ensure that all requests for user data validate the requesting user's permissions against the requested resource. 3. Implement rate limiting and anomaly detection on the loyaltyGuestId parameter to detect and block enumeration attempts. 4. Enforce strong authentication mechanisms and monitor for suspicious login patterns that could indicate credential abuse. 5. Review and enhance logging and alerting around access to personal data endpoints to enable rapid detection of unauthorized access. 6. Educate users about the importance of securing their credentials to reduce the risk of account compromise. 7. For organizations managing their own backend integrations with the app, ensure that API endpoints enforce strict access control policies. 8. Regularly test the application and backend services for similar authorization bypass vulnerabilities using automated security scanning and manual penetration testing.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2025-12-09T10:11:51.748Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69679e808330e0671667a5ed

Added to database: 1/14/2026, 1:47:44 PM

Last enriched: 1/14/2026, 2:02:06 PM

Last updated: 1/14/2026, 6:01:05 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats