Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22289: Missing Authorization in enituretechnology LTL Freight Quotes – Unishippers Edition

0
Unknown
VulnerabilityCVE-2025-22289cvecve-2025-22289
Published: Sun Feb 16 2025 (02/16/2025, 22:17:16 UTC)
Source: CVE Database V5
Vendor/Project: enituretechnology
Product: LTL Freight Quotes – Unishippers Edition

Description

Missing Authorization vulnerability in enituretechnology LTL Freight Quotes – Unishippers Edition ltl-freight-quotes-unishippers-edition allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects LTL Freight Quotes – Unishippers Edition: from n/a through <= 2.5.8.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 10:04:52 UTC

Technical Analysis

CVE-2025-22289 identifies a missing authorization vulnerability in the enituretechnology LTL Freight Quotes – Unishippers Edition software, specifically affecting versions up to 2.5.8. The vulnerability arises from incorrectly configured access control security levels, which fail to properly enforce authorization checks on certain functions or data access paths within the application. This misconfiguration allows an attacker to bypass intended access restrictions, potentially gaining unauthorized access to freight quote information or administrative features. The affected product is a specialized freight quoting tool used primarily in logistics and supply chain management to generate less-than-truckload (LTL) freight quotes. Although no public exploits have been reported, the vulnerability's nature suggests that an attacker with network access to the application could exploit it without requiring user interaction or authentication, depending on deployment specifics. The lack of a CVSS score indicates that the vulnerability is newly disclosed and pending further analysis. However, missing authorization vulnerabilities typically pose a high risk due to their potential to expose sensitive business data or disrupt operations. The vulnerability was reserved in early January 2025 and published in February 2025, indicating recent discovery. No patches or mitigations have been linked yet, emphasizing the need for immediate attention from affected users. Organizations relying on this software should conduct thorough access control reviews and prepare to deploy vendor patches promptly once available.

Potential Impact

The primary impact of CVE-2025-22289 is unauthorized access to sensitive freight quoting data or administrative functions within the LTL Freight Quotes – Unishippers Edition software. This can lead to confidentiality breaches exposing pricing, shipment details, or customer information, potentially harming business competitiveness and customer trust. Integrity of freight data could be compromised if attackers manipulate quotes or shipment parameters, leading to financial losses or operational disruptions. Availability impact is less direct but could occur if attackers leverage unauthorized access to disrupt services or corrupt data. For organizations in logistics and supply chain sectors, such unauthorized access can interrupt business processes, delay shipments, and damage relationships with partners and customers. The vulnerability's ease of exploitation, given missing authorization checks, increases risk, especially in environments where the software is exposed to internal or external networks without strict segmentation. The absence of known exploits suggests a window for proactive mitigation, but also the potential for future exploitation once details become widely known. Overall, the threat poses a significant risk to confidentiality and integrity, with moderate potential availability impact.

Mitigation Recommendations

Organizations should immediately review and audit access control configurations within the LTL Freight Quotes – Unishippers Edition software to identify and remediate any improperly enforced authorization checks. Until a vendor patch is released, restrict network access to the application to trusted internal networks and implement strict firewall rules to limit exposure. Employ network segmentation to isolate the freight quoting system from broader corporate networks and sensitive data repositories. Monitor application logs and access patterns for unusual or unauthorized activity indicative of exploitation attempts. Engage with the vendor, enituretechnology, to obtain timelines for patch releases and apply updates promptly once available. Consider implementing additional compensating controls such as multi-factor authentication for administrative access and enhanced user activity monitoring. Conduct employee training to raise awareness about the risks of unauthorized access and the importance of reporting anomalies. Finally, maintain up-to-date backups of critical freight data to enable recovery in case of data integrity issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-01-03T13:15:52.398Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd75d6e6bfc5ba1df07fc9

Added to database: 4/1/2026, 7:45:26 PM

Last enriched: 4/2/2026, 10:04:52 AM

Last updated: 4/6/2026, 9:23:38 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses