Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41094: CWE-639 Authorization Bypass Through User-Controlled Key in GLOBAL PLANNING SOLUTIONS S.L (GPS) BOLD Workplanner

0
High
VulnerabilityCVE-2025-41094cvecve-2025-41094cwe-639
Published: Tue Sep 30 2025 (09/30/2025, 11:14:33 UTC)
Source: CVE Database V5
Vendor/Project: GLOBAL PLANNING SOLUTIONS S.L (GPS)
Product: BOLD Workplanner

Description

CVE-2025-41094 is a high-severity authorization bypass vulnerability (IDOR) in GLOBAL PLANNING SOLUTIONS S. L's BOLD Workplanner versions prior to 2. 5. 25. It allows authenticated users to access contract details they are not authorized to view by manipulating internal identifiers due to insufficient input validation. The vulnerability requires no user interaction and can be exploited remotely with low complexity. Although no known exploits are currently reported in the wild, the impact on confidentiality is significant, potentially exposing sensitive contract information. European organizations using affected versions should prioritize patching and implement strict access controls. Countries with higher adoption of BOLD Workplanner and critical infrastructure relying on contract management systems are at greater risk. Immediate mitigation includes upgrading to version 2.

AI-Powered Analysis

AILast updated: 10/07/2025, 11:27:21 UTC

Technical Analysis

CVE-2025-41094 is an Insecure Direct Object Reference (IDOR) vulnerability classified under CWE-639, affecting BOLD Workplanner software by GLOBAL PLANNING SOLUTIONS S.L (GPS) in versions prior to 2.5.25. The flaw arises from inadequate validation of user-supplied input, specifically internal identifiers used to access contract details. Authenticated users with legitimate access to the system can manipulate these identifiers to retrieve contract information they are not authorized to view, effectively bypassing authorization controls. The vulnerability does not require user interaction and can be exploited remotely over the network with low attack complexity, as indicated by the CVSS 4.0 vector (AV:N/AC:L/PR:L/UI:N). The impact is primarily on confidentiality, as unauthorized disclosure of sensitive contract data can occur, potentially leading to business intelligence leaks, competitive disadvantage, or compliance violations. Integrity and availability are not directly affected. No public exploits are known at this time, but the vulnerability's nature and ease of exploitation make it a credible threat. The lack of a patch link suggests that remediation involves upgrading to version 2.5.25 or later, where the issue is resolved. Organizations should also review access control mechanisms and implement additional input validation to mitigate exploitation risks.

Potential Impact

For European organizations, the unauthorized access to contract details can have severe consequences including exposure of sensitive business agreements, pricing, and client information. This can lead to loss of competitive advantage, reputational damage, and potential regulatory penalties under data protection laws such as GDPR if personal or sensitive data is involved. Industries relying heavily on contract management, such as manufacturing, logistics, and professional services, may face operational disruptions or financial losses. The breach of confidentiality could also facilitate further attacks by providing threat actors with valuable intelligence. Since the vulnerability requires authenticated access, insider threats or compromised credentials increase the risk. The widespread use of BOLD Workplanner in Europe, especially in countries with strong manufacturing and service sectors, amplifies the potential impact. Additionally, organizations involved in cross-border contracts within the EU must be vigilant to avoid cascading effects on supply chains and partnerships.

Mitigation Recommendations

1. Upgrade BOLD Workplanner to version 2.5.25 or later immediately to apply the official fix. 2. Implement strict access control policies ensuring users have the minimum necessary privileges, and regularly audit user permissions. 3. Conduct thorough input validation on all user-supplied identifiers to prevent unauthorized access attempts. 4. Monitor system and application logs for unusual access patterns or attempts to access unauthorized contract details. 5. Employ anomaly detection tools to identify suspicious behavior indicative of exploitation attempts. 6. Educate users about the risks of credential compromise and enforce strong authentication mechanisms, such as multi-factor authentication (MFA). 7. If immediate patching is not feasible, apply compensating controls such as network segmentation and enhanced monitoring around the BOLD Workplanner system. 8. Review and update incident response plans to include scenarios involving unauthorized data access through IDOR vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:09:36.725Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68dbbca396e5c3a04c0b3782

Added to database: 9/30/2025, 11:18:59 AM

Last enriched: 10/7/2025, 11:27:21 AM

Last updated: 11/12/2025, 4:49:10 PM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats