Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41091: CWE-639 Authorization Bypass Through User-Controlled Key in GLOBAL PLANNING SOLUTIONS S.L (GPS) BOLD Workplanner

0
High
VulnerabilityCVE-2025-41091cvecve-2025-41091cwe-639
Published: Tue Sep 30 2025 (09/30/2025, 11:10:49 UTC)
Source: CVE Database V5
Vendor/Project: GLOBAL PLANNING SOLUTIONS S.L (GPS)
Product: BOLD Workplanner

Description

CVE-2025-41091 is a high-severity Insecure Direct Object Reference (IDOR) vulnerability in GLOBAL PLANNING SOLUTIONS S. L's BOLD Workplanner versions prior to 2. 5. 25. It allows authenticated users to bypass authorization controls by manipulating user-controlled keys to access unauthorized calendar details. The vulnerability requires no user interaction and can be exploited remotely with low complexity. Although no known exploits are currently reported in the wild, the flaw poses a significant risk to confidentiality due to unauthorized data exposure. European organizations using affected versions should prioritize patching once available and implement strict access controls. Countries with higher adoption of BOLD Workplanner and critical infrastructure relying on scheduling tools are at greater risk. Mitigation includes monitoring access logs for anomalous activity and restricting internal identifier exposure.

AI-Powered Analysis

AILast updated: 10/07/2025, 11:28:44 UTC

Technical Analysis

CVE-2025-41091 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting BOLD Workplanner, a scheduling and resource planning software developed by GLOBAL PLANNING SOLUTIONS S.L. The flaw exists in versions prior to 2.5.25, specifically version 2.5.24 and earlier. It arises from insufficient validation of user-supplied input, allowing authenticated users to manipulate internal identifiers (keys) to access calendar details that they are not authorized to view. This type of vulnerability is commonly known as an Insecure Direct Object Reference (IDOR). The vulnerability can be exploited remotely over the network without requiring user interaction or elevated privileges beyond authentication. The CVSS 4.0 score of 7.1 indicates a high severity, with attack vector being network-based, low attack complexity, no privileges required beyond authentication, and no user interaction needed. The impact is primarily on confidentiality, as unauthorized users can access sensitive calendar information, potentially exposing private scheduling data or business-critical timelines. No known exploits have been reported in the wild as of the publication date (September 30, 2025), but the vulnerability poses a significant risk to organizations relying on BOLD Workplanner for internal planning and scheduling. The lack of a patch link suggests that a fix may be pending or recently released. Given the nature of the vulnerability, attackers could leverage this flaw to gather intelligence or disrupt operational confidentiality.

Potential Impact

For European organizations, the impact of CVE-2025-41091 is primarily the unauthorized disclosure of sensitive calendar and scheduling information. This can lead to exposure of confidential business plans, employee schedules, or project timelines, which could be exploited for competitive intelligence, social engineering, or operational disruption. Organizations in sectors such as manufacturing, logistics, healthcare, and critical infrastructure that rely heavily on resource planning tools like BOLD Workplanner are particularly vulnerable. The breach of confidentiality could also lead to regulatory non-compliance under GDPR if personal data is exposed, resulting in potential fines and reputational damage. Since the vulnerability requires authentication but no user interaction, insider threats or compromised credentials could be leveraged to exploit this flaw at scale. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for targeted attacks, especially in high-value environments.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Upgrade BOLD Workplanner to version 2.5.25 or later as soon as the patch becomes available to remediate the vulnerability. 2) Until patching is possible, enforce strict access controls and role-based permissions to limit authenticated users’ ability to access calendar data beyond their scope. 3) Implement input validation and monitoring on internal identifier parameters to detect and block unauthorized access attempts. 4) Conduct regular audits of user access logs to identify anomalous or suspicious activity indicative of exploitation attempts. 5) Employ multi-factor authentication (MFA) to reduce the risk of credential compromise that could facilitate exploitation. 6) Educate users about the risks of credential sharing and phishing to minimize insider threat vectors. 7) Coordinate with the vendor for timely updates and security advisories. 8) Consider network segmentation to isolate critical scheduling systems from broader network access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:09:36.724Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68dbbca396e5c3a04c0b3779

Added to database: 9/30/2025, 11:18:59 AM

Last enriched: 10/7/2025, 11:28:44 AM

Last updated: 10/7/2025, 1:41:22 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats