CVE-2025-41030: CWE-863 Incorrect Authorization in T-INNOVA Deporsite
Lack of authorisation in Deporsite by T-INNOVA. This vulnerability allows an unauthenticated attacker to obtain information from other users via GET ‘/ajax/TInnova_v2/Integrantes_Recurso_v2_1/llamadaAjax/buscarPersona’ using the ‘dni’ parameter.
AI Analysis
Technical Summary
CVE-2025-41030 is a medium severity vulnerability identified in the Deporsite product by T-INNOVA, affecting versions prior to v02.14.1115. The vulnerability is classified under CWE-863, which pertains to incorrect authorization. Specifically, the issue arises due to a lack of proper authorization controls on the endpoint '/ajax/TInnova_v2/Integrantes_Recurso_v2_1/llamadaAjax/buscarPersona'. This endpoint accepts a 'dni' parameter, which is presumably a unique identifier such as a national ID number. Because the endpoint does not enforce authorization, an unauthenticated attacker can query this endpoint with arbitrary 'dni' values and retrieve information about other users. The vulnerability is remotely exploitable without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). The impact primarily concerns confidentiality, as unauthorized disclosure of personal or sensitive user information is possible. The CVSS score of 6.9 reflects a medium severity rating, acknowledging the ease of exploitation but limited scope to confidentiality impact only. No known exploits are currently reported in the wild, and no patches are linked yet, indicating that organizations using affected versions remain vulnerable until an update is applied. The vulnerability was reserved in April 2025 and published in September 2025, suggesting it is a recent discovery. The lack of authentication and authorization checks on a sensitive data retrieval endpoint represents a significant security oversight in Deporsite's design, potentially exposing personal data to attackers who can automate queries to harvest user information.
Potential Impact
For European organizations using Deporsite, this vulnerability poses a significant risk to user privacy and data protection compliance, particularly under GDPR regulations which mandate strict controls on personal data access and processing. Unauthorized access to personal identifiers like 'dni' could lead to data breaches involving sensitive personal information, potentially resulting in regulatory fines, reputational damage, and loss of customer trust. Organizations in sectors such as sports clubs, membership organizations, or any entities relying on Deporsite for managing member data are at risk of having confidential user information exposed. The ease of exploitation without authentication increases the likelihood of automated attacks and large-scale data harvesting. This could also facilitate further attacks such as identity theft, social engineering, or targeted phishing campaigns against affected users. The medium severity rating indicates that while the vulnerability does not allow system takeover or direct integrity/availability compromise, the confidentiality breach alone is impactful enough to warrant urgent remediation in the European context where data privacy is highly regulated.
Mitigation Recommendations
European organizations should immediately assess their use of Deporsite and identify if they are running affected versions prior to v02.14.1115. Until an official patch is released, organizations should implement compensating controls such as restricting access to the vulnerable endpoint via network-level controls (e.g., firewall rules, IP whitelisting) to trusted internal networks only. Web application firewalls (WAFs) can be configured to detect and block suspicious requests targeting the '/ajax/TInnova_v2/Integrantes_Recurso_v2_1/llamadaAjax/buscarPersona' endpoint, especially those with unusual or automated 'dni' parameter values. Monitoring and logging access to this endpoint should be enhanced to detect potential exploitation attempts. Additionally, organizations should review and enforce strict authorization checks on all sensitive API endpoints to ensure that only authenticated and authorized users can access personal data. User education on phishing risks and incident response plans should be updated to address potential fallout from data leakage. Finally, organizations should engage with T-INNOVA for timely updates and apply patches as soon as they become available.
Affected Countries
Spain, Germany, France, Italy, Netherlands
CVE-2025-41030: CWE-863 Incorrect Authorization in T-INNOVA Deporsite
Description
Lack of authorisation in Deporsite by T-INNOVA. This vulnerability allows an unauthenticated attacker to obtain information from other users via GET ‘/ajax/TInnova_v2/Integrantes_Recurso_v2_1/llamadaAjax/buscarPersona’ using the ‘dni’ parameter.
AI-Powered Analysis
Technical Analysis
CVE-2025-41030 is a medium severity vulnerability identified in the Deporsite product by T-INNOVA, affecting versions prior to v02.14.1115. The vulnerability is classified under CWE-863, which pertains to incorrect authorization. Specifically, the issue arises due to a lack of proper authorization controls on the endpoint '/ajax/TInnova_v2/Integrantes_Recurso_v2_1/llamadaAjax/buscarPersona'. This endpoint accepts a 'dni' parameter, which is presumably a unique identifier such as a national ID number. Because the endpoint does not enforce authorization, an unauthenticated attacker can query this endpoint with arbitrary 'dni' values and retrieve information about other users. The vulnerability is remotely exploitable without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). The impact primarily concerns confidentiality, as unauthorized disclosure of personal or sensitive user information is possible. The CVSS score of 6.9 reflects a medium severity rating, acknowledging the ease of exploitation but limited scope to confidentiality impact only. No known exploits are currently reported in the wild, and no patches are linked yet, indicating that organizations using affected versions remain vulnerable until an update is applied. The vulnerability was reserved in April 2025 and published in September 2025, suggesting it is a recent discovery. The lack of authentication and authorization checks on a sensitive data retrieval endpoint represents a significant security oversight in Deporsite's design, potentially exposing personal data to attackers who can automate queries to harvest user information.
Potential Impact
For European organizations using Deporsite, this vulnerability poses a significant risk to user privacy and data protection compliance, particularly under GDPR regulations which mandate strict controls on personal data access and processing. Unauthorized access to personal identifiers like 'dni' could lead to data breaches involving sensitive personal information, potentially resulting in regulatory fines, reputational damage, and loss of customer trust. Organizations in sectors such as sports clubs, membership organizations, or any entities relying on Deporsite for managing member data are at risk of having confidential user information exposed. The ease of exploitation without authentication increases the likelihood of automated attacks and large-scale data harvesting. This could also facilitate further attacks such as identity theft, social engineering, or targeted phishing campaigns against affected users. The medium severity rating indicates that while the vulnerability does not allow system takeover or direct integrity/availability compromise, the confidentiality breach alone is impactful enough to warrant urgent remediation in the European context where data privacy is highly regulated.
Mitigation Recommendations
European organizations should immediately assess their use of Deporsite and identify if they are running affected versions prior to v02.14.1115. Until an official patch is released, organizations should implement compensating controls such as restricting access to the vulnerable endpoint via network-level controls (e.g., firewall rules, IP whitelisting) to trusted internal networks only. Web application firewalls (WAFs) can be configured to detect and block suspicious requests targeting the '/ajax/TInnova_v2/Integrantes_Recurso_v2_1/llamadaAjax/buscarPersona' endpoint, especially those with unusual or automated 'dni' parameter values. Monitoring and logging access to this endpoint should be enhanced to detect potential exploitation attempts. Additionally, organizations should review and enforce strict authorization checks on all sensitive API endpoints to ensure that only authenticated and authorized users can access personal data. User education on phishing risks and incident response plans should be updated to address potential fallout from data leakage. Finally, organizations should engage with T-INNOVA for timely updates and apply patches as soon as they become available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- INCIBE
- Date Reserved
- 2025-04-16T09:09:26.929Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b6abafad5a09ad00da45c4
Added to database: 9/2/2025, 8:32:47 AM
Last enriched: 9/2/2025, 8:48:05 AM
Last updated: 9/2/2025, 10:21:55 AM
Views: 3
Related Threats
CVE-2025-52551: CWE-306 Missing Authentication for Critical Function in Copeland LP E2 Facility Management System
CriticalCVE-2025-46810: CWE-61: UNIX Symbolic Link (Symlink) Following in openSUSE Tumbleweed
HighCVE-2025-5662: CWE-502 Deserialization of Untrusted Data in h2oai h2oai/h2o-3
CriticalCVE-2025-6519: CWE-522 Insufficiently Protected Credentials in Copeland LP E3 Supervisory Control
CriticalCVE-2025-52550: CWE-347 Improper Verification of Cryptographic Signature in Copeland LP E3 Supervisory Control
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.