Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41092: CWE-639 Authorization Bypass Through User-Controlled Key in GLOBAL PLANNING SOLUTIONS S.L (GPS) BOLD Workplanner

0
High
VulnerabilityCVE-2025-41092cvecve-2025-41092cwe-639
Published: Tue Sep 30 2025 (09/30/2025, 11:12:59 UTC)
Source: CVE Database V5
Vendor/Project: GLOBAL PLANNING SOLUTIONS S.L (GPS)
Product: BOLD Workplanner

Description

CVE-2025-41092 is an Insecure Direct Object Reference (IDOR) vulnerability in GLOBAL PLANNING SOLUTIONS S. L's BOLD Workplanner versions prior to 2. 5. 25. It allows authenticated users to access unauthorized time record details by manipulating internal identifiers due to insufficient validation of user input. The vulnerability has a CVSS 4. 0 base score of 7. 1, indicating high severity, with network attack vector, low attack complexity, and no user interaction required. Exploitation does not require elevated privileges beyond authentication, and it impacts confidentiality by exposing sensitive time record data. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 10/07/2025, 11:26:49 UTC

Technical Analysis

CVE-2025-41092 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting BOLD Workplanner, a workforce management software developed by GLOBAL PLANNING SOLUTIONS S.L. The flaw exists in versions prior to 2.5.25, where the application fails to adequately validate user-supplied identifiers when accessing time record details. This Insecure Direct Object Reference (IDOR) vulnerability enables any authenticated user to manipulate internal keys or identifiers to retrieve time records that they are not authorized to view. The vulnerability is exploitable remotely over the network without requiring user interaction or elevated privileges beyond authentication, making it relatively easy to exploit. The CVSS 4.0 vector (AV:N/AC:L/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) reflects a high-severity issue primarily impacting confidentiality, as unauthorized access to sensitive timekeeping data can lead to privacy breaches, insider threat risks, and potential compliance violations. No patches or exploits are currently publicly available, but the vendor is expected to release a fix in version 2.5.25 or later. The vulnerability highlights a common security oversight where server-side authorization checks are insufficient or bypassable by manipulating object references, underscoring the need for robust access control mechanisms in enterprise applications handling sensitive employee data.

Potential Impact

For European organizations, the impact of CVE-2025-41092 can be significant. Unauthorized access to time record details may expose sensitive employee data, including work hours, attendance, and potentially payroll-related information. This exposure risks violating the EU General Data Protection Regulation (GDPR), leading to legal penalties and reputational damage. Organizations relying on BOLD Workplanner for workforce management could face insider threat scenarios where malicious or careless employees access or leak confidential data. Additionally, compromised data integrity could affect payroll accuracy and labor compliance reporting, potentially resulting in financial discrepancies and regulatory scrutiny. The breach of confidentiality may also erode employee trust and impact operational security. Given the vulnerability requires only authenticated access, attackers could be internal users or compromised accounts, increasing the threat surface. The lack of known exploits in the wild provides a window for proactive mitigation, but organizations should act swiftly to prevent exploitation.

Mitigation Recommendations

To mitigate CVE-2025-41092, European organizations should: 1) Upgrade BOLD Workplanner to version 2.5.25 or later as soon as the patch is released by GLOBAL PLANNING SOLUTIONS S.L. 2) Until patching is possible, implement strict server-side validation of all user-supplied identifiers to ensure users can only access records they are authorized to view. 3) Conduct an access control audit focusing on authorization logic related to time record retrieval and enforce the principle of least privilege. 4) Monitor application logs for unusual access patterns or attempts to access unauthorized records, enabling early detection of exploitation attempts. 5) Educate users about the importance of safeguarding authentication credentials to prevent account compromise. 6) Employ network segmentation and multi-factor authentication (MFA) to reduce the risk of unauthorized access. 7) Review and update incident response plans to include scenarios involving insider threats and data exposure from workforce management systems. 8) Coordinate with the vendor for timely updates and security advisories.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:09:36.724Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68dbbca396e5c3a04c0b377c

Added to database: 9/30/2025, 11:18:59 AM

Last enriched: 10/7/2025, 11:26:49 AM

Last updated: 10/7/2025, 1:41:32 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats