Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41077: CWE-639 Authorization Bypass Through User-Controlled Key in Viafirma Inbox

0
High
VulnerabilityCVE-2025-41077cvecve-2025-41077cwe-639
Published: Mon Jan 12 2026 (01/12/2026, 14:54:51 UTC)
Source: CVE Database V5
Vendor/Project: Viafirma
Product: Inbox

Description

IDOR vulnerability has been found in Viafirma Inbox v4.5.13 that allows any authenticated user without privileges in the application to list all users, access and modify their data. This allows the user's email addresses to be modified and, subsequently, using the password recovery functionality to access the application by impersonating any user, including those with administrative permissions.

AI-Powered Analysis

AILast updated: 01/12/2026, 15:23:43 UTC

Technical Analysis

CVE-2025-41077 is an authorization bypass vulnerability identified in Viafirma Inbox version 4.5.13, categorized under CWE-639 (Authorization Bypass Through User-Controlled Key). The vulnerability is an Insecure Direct Object Reference (IDOR) that allows any authenticated user, regardless of their assigned privileges, to list all users within the application and access or modify their data. Specifically, attackers can alter users' email addresses, which can then be leveraged to exploit the password recovery functionality. By changing the email address associated with a target user account, an attacker can trigger password reset processes and gain unauthorized access by impersonating that user, including high-privilege administrative accounts. The vulnerability does not require elevated privileges or user interaction, and the attack vector is network-based with low complexity. The CVSS v4.0 score is 8.6 (high), reflecting the critical impact on confidentiality and integrity, as well as the ease of exploitation. No patches or public exploits are currently available, but the flaw poses a significant risk to organizations relying on this product for secure communications and document management. The root cause is inadequate authorization checks on user-controlled keys, allowing unauthorized enumeration and modification of user data.

Potential Impact

For European organizations, the impact of CVE-2025-41077 can be substantial. Unauthorized access to user accounts, especially administrative ones, can lead to full compromise of the Viafirma Inbox environment, exposing sensitive communications and documents. This can result in data breaches, loss of confidentiality, and potential regulatory non-compliance under GDPR due to unauthorized access to personal data. Attackers could manipulate email addresses to intercept password resets, facilitating lateral movement and privilege escalation within the affected environment. The ability to impersonate users undermines trust in the platform and could disrupt business operations relying on secure document workflows. Given the widespread use of Viafirma Inbox in sectors such as finance, government, and legal services across Europe, the risk of espionage, fraud, and operational disruption is heightened. The lack of known exploits in the wild suggests a window for proactive mitigation, but the vulnerability's characteristics make it a prime target for attackers once weaponized.

Mitigation Recommendations

Organizations should immediately verify if they are running Viafirma Inbox version 4.5.13 and prioritize upgrading to a patched version once available. In the absence of an official patch, implement strict access controls to limit authenticated user capabilities and monitor for unusual user enumeration or modification activities. Disable or restrict the password recovery functionality temporarily to prevent exploitation via email address changes. Employ application-layer firewalls or WAFs to detect and block suspicious requests targeting user enumeration or modification endpoints. Conduct thorough audits of user account changes and password reset logs to identify potential abuse. Additionally, enforce multi-factor authentication (MFA) for all users, especially administrators, to mitigate the risk of account takeover. Engage with Viafirma support for guidance and monitor security advisories for updates. Finally, educate users about phishing and social engineering risks that could compound this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:09:35.597Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69650e81da2266e838bdb809

Added to database: 1/12/2026, 3:08:49 PM

Last enriched: 1/12/2026, 3:23:43 PM

Last updated: 1/13/2026, 8:03:10 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats