Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3660: Improper Authorization of Index Containing Sensitive Information in Petlibrio Smart Pet Feeder Platform

0
Medium
VulnerabilityCVE-2025-3660cvecve-2025-3660
Published: Sat Jan 03 2026 (01/03/2026, 23:33:04 UTC)
Source: CVE Database V5
Vendor/Project: Petlibrio
Product: Smart Pet Feeder Platform

Description

CVE-2025-3660 is a medium-severity broken access control vulnerability in the Petlibro Smart Pet Feeder Platform up to version 1. 7. 31. It allows unauthenticated attackers to access sensitive pet and user data by exploiting missing ownership verification on the /member/pet/detailV2 endpoint. Attackers can retrieve pet details, member IDs, and avatar URLs by submitting arbitrary pet IDs without proper authorization checks. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. Although no known exploits are currently in the wild, the flaw exposes personal information that could lead to privacy violations and targeted attacks. European organizations using this platform may face data confidentiality risks, especially those with large user bases or pet care services. Mitigation requires implementing strict ownership verification on API requests and monitoring for suspicious access patterns. Countries with higher adoption of smart pet devices and strong privacy regulations, such as Germany, France, and the UK, are more likely to be impacted.

AI-Powered Analysis

AILast updated: 01/11/2026, 21:28:03 UTC

Technical Analysis

CVE-2025-3660 identifies a broken access control vulnerability in the Petlibro Smart Pet Feeder Platform, specifically affecting versions up to 1.7.31. The flaw exists due to missing ownership verification on the API endpoint /member/pet/detailV2, which allows attackers to submit arbitrary pet IDs and retrieve sensitive information belonging to other users. This information includes pet details, member IDs, and avatar URLs. The vulnerability is exploitable remotely without requiring authentication or user interaction, making it accessible to any attacker with network access to the platform. The CVSS 4.0 score is 6.9 (medium severity), reflecting the network attack vector, low complexity, and no privileges or user interaction required. The impact primarily concerns confidentiality, as unauthorized access to personal pet and user data could lead to privacy breaches or facilitate further targeted attacks. No patches or known exploits are currently reported, but the vulnerability highlights a critical design flaw in access control mechanisms. The platform’s failure to enforce strict ownership checks on sensitive data endpoints exposes users to data leakage risks. This vulnerability underscores the importance of robust authorization controls in IoT and smart device ecosystems, where personal data is often involved.

Potential Impact

For European organizations, the primary impact of CVE-2025-3660 is the unauthorized disclosure of sensitive user and pet information, which could violate GDPR and other privacy regulations, leading to legal and reputational consequences. Organizations operating pet care services, veterinary clinics, or smart home device management platforms that integrate Petlibro feeders may inadvertently expose customer data. The breach of pet and member identifiers could also facilitate social engineering or phishing attacks targeting users. Although the vulnerability does not directly affect device availability or integrity, the loss of confidentiality can undermine user trust and result in regulatory fines. Additionally, attackers could use the exposed data to map user behaviors or locations if combined with other data sources. The medium severity rating suggests a moderate but tangible risk, especially for entities with large user bases or those in countries with strict data protection enforcement. The lack of authentication requirements increases the attack surface, making it easier for malicious actors to exploit the flaw at scale.

Mitigation Recommendations

To mitigate CVE-2025-3660, Petlibro and affected organizations should immediately implement strict ownership verification on the /member/pet/detailV2 API endpoint, ensuring that users can only access data associated with their authenticated accounts. This includes validating the pet ID against the authenticated user's permissions before returning any data. Network-level protections such as IP whitelisting or rate limiting can reduce the risk of mass data harvesting. Organizations should conduct thorough access control audits across all API endpoints to identify similar flaws. Monitoring and logging access to sensitive endpoints should be enhanced to detect anomalous request patterns indicative of exploitation attempts. Users should be advised to update to patched versions once available and to monitor their accounts for suspicious activity. Additionally, organizations should review their data retention and minimization policies to limit the amount of sensitive data exposed via APIs. Coordinated vulnerability disclosure and timely patch deployment are critical to reducing exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:12:23.273Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6959a9dfdb813ff03e731cab

Added to database: 1/3/2026, 11:44:31 PM

Last enriched: 1/11/2026, 9:28:03 PM

Last updated: 2/5/2026, 3:17:58 PM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats