Skip to main content

CVE-2025-24969: CWE-639: Authorization Bypass Through User-Controlled Key in Combodo iTop

Medium
VulnerabilityCVE-2025-24969cvecve-2025-24969cwe-639
Published: Wed May 14 2025 (05/14/2025, 15:11:45 UTC)
Source: CVE
Vendor/Project: Combodo
Product: iTop

Description

iTop is an web based IT Service Management tool. Prior to version 3.2.1, a portal user can see any other contacts picture by changing the picture ID in the URL. Version 3.2.1 contains a patch for the issue.

AI-Powered Analysis

AILast updated: 07/06/2025, 14:27:08 UTC

Technical Analysis

CVE-2025-24969 is a medium severity vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting Combodo's iTop, a web-based IT Service Management (ITSM) tool. The vulnerability exists in versions prior to 3.2.1, where a portal user can manipulate the picture ID parameter in the URL to view other users' contact pictures without proper authorization checks. This flaw allows unauthorized disclosure of user images by exploiting insufficient access control mechanisms. The vulnerability does not require user interaction and can be exploited remotely over the network with low attack complexity, but it requires the attacker to have some level of privileges (PR:L - privileges required are low). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially authorized scope. The impact is limited to confidentiality (C:L), with no impact on integrity or availability. The vendor has released version 3.2.1 to patch this issue. No known exploits are currently reported in the wild. The vulnerability highlights a failure in enforcing proper authorization checks on user-controlled keys in URL parameters, a common web application security weakness that can lead to unauthorized information disclosure.

Potential Impact

For European organizations using iTop versions prior to 3.2.1, this vulnerability poses a risk of unauthorized disclosure of user contact pictures, which may include sensitive or personally identifiable information (PII). While the direct impact on confidentiality is limited to images, such information could be leveraged in social engineering or reconnaissance activities by attackers targeting the organization. In regulated environments within Europe, such as those governed by GDPR, unauthorized exposure of personal data—even images—can lead to compliance violations and potential fines. Additionally, the vulnerability could undermine user trust in the ITSM platform and potentially expose internal organizational structure or personnel details. Although the vulnerability does not affect system integrity or availability, the confidentiality breach could be a stepping stone for more targeted attacks if combined with other vulnerabilities or insider threats.

Mitigation Recommendations

European organizations should promptly upgrade all instances of Combodo iTop to version 3.2.1 or later, where the vulnerability has been patched. Until the upgrade is applied, organizations should implement strict access control policies on the portal to limit user privileges and restrict access to sensitive user information. Monitoring and logging access to user profile pictures and related endpoints can help detect suspicious activity. Additionally, organizations should review URL parameter handling and enforce server-side authorization checks to prevent unauthorized data access. Conducting internal security assessments and penetration tests focusing on authorization bypass vulnerabilities in web applications like iTop is recommended. Finally, raising user awareness about the sensitivity of personal data and enforcing strong authentication mechanisms can reduce the risk of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-01-29T15:18:03.209Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec944

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 2:27:08 PM

Last updated: 7/31/2025, 1:59:51 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats