Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34411: CWE-862 Missing Authorization in EQS Group GmbH Convercent Whistleblowing Platform

0
Medium
VulnerabilityCVE-2025-34411cvecve-2025-34411cwe-862
Published: Mon Dec 15 2025 (12/15/2025, 14:43:37 UTC)
Source: CVE Database V5
Vendor/Project: EQS Group GmbH
Product: Convercent Whistleblowing Platform

Description

CVE-2025-34411 is a medium-severity vulnerability in the EQS Group GmbH Convercent Whistleblowing Platform. It involves a missing authorization control on an unauthenticated API endpoint (/GetLegalEntity) that allows remote attackers to enumerate internal customer legal-entity names by submitting search fragments. This information disclosure can reveal organizations using the platform, exposing sensitive business relationships and compliance infrastructure. The vulnerability requires no authentication or user interaction and has a CVSS 4. 0 base score of 6. 9. While no known exploits are currently reported in the wild, the data exposure could facilitate targeted phishing, extortion, or other social engineering attacks against whistleblowing programs. European organizations using Convercent are at risk of having their participation in whistleblowing programs exposed, potentially undermining confidentiality and trust. Mitigation involves restricting access to the API endpoint, implementing proper authorization checks, and monitoring for suspicious queries. Countries with significant adoption of Convercent or large compliance-driven sectors, such as Germany, the UK, France, and the Netherlands, are most likely to be affected.

AI-Powered Analysis

AILast updated: 12/15/2025, 15:16:30 UTC

Technical Analysis

The vulnerability identified as CVE-2025-34411 affects the Convercent Whistleblowing Platform developed by EQS Group GmbH. The core issue is a missing authorization control (CWE-862) on the /GetLegalEntity API endpoint, which is accessible without authentication. This endpoint returns internal legal-entity names of customers based on a searchText parameter. An unauthenticated remote attacker can exploit this by submitting common legal suffixes (e.g., GmbH, Ltd, SARL) to enumerate tenant organizations using the platform. This enumeration discloses sensitive information about which companies have whistleblowing programs in place, revealing internal compliance structures and potentially sensitive business relationships. The vulnerability does not impact confidentiality, integrity, or availability of the platform directly but leaks metadata that can be leveraged for targeted attacks such as phishing or extortion. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges or user interaction required (PR:N/UI:N), and low impact on confidentiality (VC:L) with no impact on integrity or availability. No patches or known exploits are currently available, but the exposure of whistleblowing program participation can undermine trust and confidentiality critical to these systems. The vulnerability was published on December 15, 2025, and affects all versions of the product as indicated. The lack of authentication on this endpoint represents a significant design oversight in access control mechanisms.

Potential Impact

For European organizations, the impact centers on the exposure of sensitive compliance and whistleblowing program participation data. Whistleblowing platforms are critical for regulatory compliance, corporate governance, and protecting employees who report misconduct. Disclosure of tenant legal entities can enable attackers to craft highly targeted phishing campaigns, social engineering attacks, or extortion attempts aimed at undermining these programs or extracting sensitive information. This could damage organizational reputation, reduce employee trust in whistleblowing mechanisms, and potentially lead to regulatory scrutiny if confidentiality is compromised. While the vulnerability does not directly allow data manipulation or service disruption, the indirect consequences of information disclosure can be severe, especially in sectors with stringent compliance requirements such as finance, healthcare, and government. European GDPR regulations also emphasize protecting personal and organizational data, and exposure of such metadata could raise compliance concerns. Organizations using Convercent must consider the reputational and operational risks associated with this vulnerability.

Mitigation Recommendations

To mitigate CVE-2025-34411, organizations and EQS Group GmbH should implement strict access controls on the /GetLegalEntity API endpoint, ensuring it requires proper authentication and authorization before returning any data. Rate limiting and anomaly detection should be applied to detect and block enumeration attempts. EQS Group should issue patches or updates that enforce these controls and remove unauthenticated access. Organizations should audit their Convercent platform configurations to verify no public or unauthenticated endpoints expose sensitive information. Additionally, monitoring network traffic for unusual queries to this endpoint can help detect exploitation attempts. Employee awareness training should emphasize the risk of phishing and social engineering attacks leveraging this information. Finally, organizations should review their whistleblowing program communications to reinforce confidentiality assurances and prepare incident response plans for potential targeted attacks stemming from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.599Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6940227fd9bcdf3f3de27537

Added to database: 12/15/2025, 3:00:15 PM

Last enriched: 12/15/2025, 3:16:30 PM

Last updated: 12/15/2025, 4:18:56 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats