CVE-2025-41092: CWE-639 Authorization Bypass Through User-Controlled Key in GLOBAL PLANNING SOLUTIONS S.L (GPS) BOLD Workplanner
CVE-2025-41092 is an Insecure Direct Object Reference (IDOR) vulnerability in GLOBAL PLANNING SOLUTIONS S. L's BOLD Workplanner versions prior to 2. 5. 25. It allows authenticated users to access unauthorized time record details by manipulating internal identifiers due to insufficient validation of user input. The vulnerability has a CVSS 4. 0 base score of 7. 1, indicating high severity, with network attack vector, low attack complexity, and no user interaction required. Exploitation does not require elevated privileges beyond authentication, and it impacts confidentiality by exposing sensitive time record data. No known exploits are currently reported in the wild.
AI Analysis
Technical Summary
CVE-2025-41092 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting BOLD Workplanner, a workforce management software developed by GLOBAL PLANNING SOLUTIONS S.L. The flaw exists in versions prior to 2.5.25, where the application fails to adequately validate user-supplied identifiers when accessing time record details. This Insecure Direct Object Reference (IDOR) vulnerability enables any authenticated user to manipulate internal keys or identifiers to retrieve time records that they are not authorized to view. The vulnerability is exploitable remotely over the network without requiring user interaction or elevated privileges beyond authentication, making it relatively easy to exploit. The CVSS 4.0 vector (AV:N/AC:L/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) reflects a high-severity issue primarily impacting confidentiality, as unauthorized access to sensitive timekeeping data can lead to privacy breaches, insider threat risks, and potential compliance violations. No patches or exploits are currently publicly available, but the vendor is expected to release a fix in version 2.5.25 or later. The vulnerability highlights a common security oversight where server-side authorization checks are insufficient or bypassable by manipulating object references, underscoring the need for robust access control mechanisms in enterprise applications handling sensitive employee data.
Potential Impact
For European organizations, the impact of CVE-2025-41092 can be significant. Unauthorized access to time record details may expose sensitive employee data, including work hours, attendance, and potentially payroll-related information. This exposure risks violating the EU General Data Protection Regulation (GDPR), leading to legal penalties and reputational damage. Organizations relying on BOLD Workplanner for workforce management could face insider threat scenarios where malicious or careless employees access or leak confidential data. Additionally, compromised data integrity could affect payroll accuracy and labor compliance reporting, potentially resulting in financial discrepancies and regulatory scrutiny. The breach of confidentiality may also erode employee trust and impact operational security. Given the vulnerability requires only authenticated access, attackers could be internal users or compromised accounts, increasing the threat surface. The lack of known exploits in the wild provides a window for proactive mitigation, but organizations should act swiftly to prevent exploitation.
Mitigation Recommendations
To mitigate CVE-2025-41092, European organizations should: 1) Upgrade BOLD Workplanner to version 2.5.25 or later as soon as the patch is released by GLOBAL PLANNING SOLUTIONS S.L. 2) Until patching is possible, implement strict server-side validation of all user-supplied identifiers to ensure users can only access records they are authorized to view. 3) Conduct an access control audit focusing on authorization logic related to time record retrieval and enforce the principle of least privilege. 4) Monitor application logs for unusual access patterns or attempts to access unauthorized records, enabling early detection of exploitation attempts. 5) Educate users about the importance of safeguarding authentication credentials to prevent account compromise. 6) Employ network segmentation and multi-factor authentication (MFA) to reduce the risk of unauthorized access. 7) Review and update incident response plans to include scenarios involving insider threats and data exposure from workforce management systems. 8) Coordinate with the vendor for timely updates and security advisories.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-41092: CWE-639 Authorization Bypass Through User-Controlled Key in GLOBAL PLANNING SOLUTIONS S.L (GPS) BOLD Workplanner
Description
CVE-2025-41092 is an Insecure Direct Object Reference (IDOR) vulnerability in GLOBAL PLANNING SOLUTIONS S. L's BOLD Workplanner versions prior to 2. 5. 25. It allows authenticated users to access unauthorized time record details by manipulating internal identifiers due to insufficient validation of user input. The vulnerability has a CVSS 4. 0 base score of 7. 1, indicating high severity, with network attack vector, low attack complexity, and no user interaction required. Exploitation does not require elevated privileges beyond authentication, and it impacts confidentiality by exposing sensitive time record data. No known exploits are currently reported in the wild.
AI-Powered Analysis
Technical Analysis
CVE-2025-41092 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting BOLD Workplanner, a workforce management software developed by GLOBAL PLANNING SOLUTIONS S.L. The flaw exists in versions prior to 2.5.25, where the application fails to adequately validate user-supplied identifiers when accessing time record details. This Insecure Direct Object Reference (IDOR) vulnerability enables any authenticated user to manipulate internal keys or identifiers to retrieve time records that they are not authorized to view. The vulnerability is exploitable remotely over the network without requiring user interaction or elevated privileges beyond authentication, making it relatively easy to exploit. The CVSS 4.0 vector (AV:N/AC:L/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) reflects a high-severity issue primarily impacting confidentiality, as unauthorized access to sensitive timekeeping data can lead to privacy breaches, insider threat risks, and potential compliance violations. No patches or exploits are currently publicly available, but the vendor is expected to release a fix in version 2.5.25 or later. The vulnerability highlights a common security oversight where server-side authorization checks are insufficient or bypassable by manipulating object references, underscoring the need for robust access control mechanisms in enterprise applications handling sensitive employee data.
Potential Impact
For European organizations, the impact of CVE-2025-41092 can be significant. Unauthorized access to time record details may expose sensitive employee data, including work hours, attendance, and potentially payroll-related information. This exposure risks violating the EU General Data Protection Regulation (GDPR), leading to legal penalties and reputational damage. Organizations relying on BOLD Workplanner for workforce management could face insider threat scenarios where malicious or careless employees access or leak confidential data. Additionally, compromised data integrity could affect payroll accuracy and labor compliance reporting, potentially resulting in financial discrepancies and regulatory scrutiny. The breach of confidentiality may also erode employee trust and impact operational security. Given the vulnerability requires only authenticated access, attackers could be internal users or compromised accounts, increasing the threat surface. The lack of known exploits in the wild provides a window for proactive mitigation, but organizations should act swiftly to prevent exploitation.
Mitigation Recommendations
To mitigate CVE-2025-41092, European organizations should: 1) Upgrade BOLD Workplanner to version 2.5.25 or later as soon as the patch is released by GLOBAL PLANNING SOLUTIONS S.L. 2) Until patching is possible, implement strict server-side validation of all user-supplied identifiers to ensure users can only access records they are authorized to view. 3) Conduct an access control audit focusing on authorization logic related to time record retrieval and enforce the principle of least privilege. 4) Monitor application logs for unusual access patterns or attempts to access unauthorized records, enabling early detection of exploitation attempts. 5) Educate users about the importance of safeguarding authentication credentials to prevent account compromise. 6) Employ network segmentation and multi-factor authentication (MFA) to reduce the risk of unauthorized access. 7) Review and update incident response plans to include scenarios involving insider threats and data exposure from workforce management systems. 8) Coordinate with the vendor for timely updates and security advisories.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- INCIBE
- Date Reserved
- 2025-04-16T09:09:36.724Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68dbbca396e5c3a04c0b377c
Added to database: 9/30/2025, 11:18:59 AM
Last enriched: 10/7/2025, 11:26:49 AM
Last updated: 10/7/2025, 1:41:32 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40886: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.