CVE-2025-41094: CWE-639 Authorization Bypass Through User-Controlled Key in GLOBAL PLANNING SOLUTIONS S.L (GPS) BOLD Workplanner
Insecure Direct Object Reference (IDOR) vulnerability in BOLD Workplanner in versions prior to 2.5.25 (4935b438f9b), consisting of a lack of adequate validation of user input, allowing an authenticated user to access to functional contract details using unauthorised internal identifiers.
AI Analysis
Technical Summary
CVE-2025-41094 is an Insecure Direct Object Reference (IDOR) vulnerability identified in the BOLD Workplanner product developed by GLOBAL PLANNING SOLUTIONS S.L (GPS). This vulnerability affects versions prior to 2.5.25, specifically version 2.5.24 and earlier. The core issue arises from insufficient validation of user input, which allows an authenticated user to access functional contract details by manipulating internal identifiers that they should not be authorized to view. This is classified under CWE-639, which pertains to authorization bypass through user-controlled keys. The vulnerability does not require user interaction and can be exploited remotely over the network without elevated privileges beyond authentication. The CVSS 4.0 base score is 7.1 (high severity), reflecting the network attack vector, low attack complexity, no privileges required beyond authentication, and no user interaction needed. The impact is primarily on confidentiality, as unauthorized users can access sensitive contract information that should be restricted. There is no indication of integrity or availability impact. No known exploits are currently reported in the wild, and no patches or mitigations have been linked yet. The vulnerability was reserved in April 2025 and published in September 2025, indicating recent discovery and disclosure. The lack of proper authorization checks on internal identifiers means that an attacker with valid credentials can enumerate or guess identifiers to retrieve data belonging to other users or contracts, potentially exposing sensitive business information.
Potential Impact
For European organizations using BOLD Workplanner, this vulnerability poses a significant risk to the confidentiality of sensitive contract data. Unauthorized access to contract details could lead to exposure of proprietary business information, client data, pricing, and negotiation terms. This could result in competitive disadvantage, reputational damage, and potential regulatory non-compliance, especially under GDPR where unauthorized access to personal or business data is a serious concern. The impact is heightened for organizations in sectors with strict confidentiality requirements such as finance, legal, and government contractors. Since the vulnerability requires authentication but no elevated privileges, any compromised or insider user account could be leveraged to exploit this flaw. The absence of known exploits in the wild suggests limited immediate threat, but the ease of exploitation and high impact make it a critical issue to address promptly. The vulnerability does not affect system availability or integrity directly but could be a stepping stone for further attacks or data leakage.
Mitigation Recommendations
Organizations should prioritize upgrading BOLD Workplanner to version 2.5.25 or later once available, as this is expected to include the necessary authorization checks to fix the IDOR vulnerability. Until a patch is applied, implement strict access controls and monitoring on user accounts with access to the Workplanner system. Employ logging and alerting to detect unusual access patterns or attempts to access unauthorized contract identifiers. Conduct a thorough review of user permissions to ensure the principle of least privilege is enforced, limiting authenticated users to only the data necessary for their role. Consider implementing additional application-layer controls such as web application firewalls (WAFs) with custom rules to detect and block suspicious parameter tampering indicative of IDOR exploitation attempts. Regularly audit and rotate user credentials to reduce the risk of compromised accounts. Engage with the vendor for timely updates and security advisories. Finally, educate users about the importance of safeguarding their credentials to prevent unauthorized access.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-41094: CWE-639 Authorization Bypass Through User-Controlled Key in GLOBAL PLANNING SOLUTIONS S.L (GPS) BOLD Workplanner
Description
Insecure Direct Object Reference (IDOR) vulnerability in BOLD Workplanner in versions prior to 2.5.25 (4935b438f9b), consisting of a lack of adequate validation of user input, allowing an authenticated user to access to functional contract details using unauthorised internal identifiers.
AI-Powered Analysis
Technical Analysis
CVE-2025-41094 is an Insecure Direct Object Reference (IDOR) vulnerability identified in the BOLD Workplanner product developed by GLOBAL PLANNING SOLUTIONS S.L (GPS). This vulnerability affects versions prior to 2.5.25, specifically version 2.5.24 and earlier. The core issue arises from insufficient validation of user input, which allows an authenticated user to access functional contract details by manipulating internal identifiers that they should not be authorized to view. This is classified under CWE-639, which pertains to authorization bypass through user-controlled keys. The vulnerability does not require user interaction and can be exploited remotely over the network without elevated privileges beyond authentication. The CVSS 4.0 base score is 7.1 (high severity), reflecting the network attack vector, low attack complexity, no privileges required beyond authentication, and no user interaction needed. The impact is primarily on confidentiality, as unauthorized users can access sensitive contract information that should be restricted. There is no indication of integrity or availability impact. No known exploits are currently reported in the wild, and no patches or mitigations have been linked yet. The vulnerability was reserved in April 2025 and published in September 2025, indicating recent discovery and disclosure. The lack of proper authorization checks on internal identifiers means that an attacker with valid credentials can enumerate or guess identifiers to retrieve data belonging to other users or contracts, potentially exposing sensitive business information.
Potential Impact
For European organizations using BOLD Workplanner, this vulnerability poses a significant risk to the confidentiality of sensitive contract data. Unauthorized access to contract details could lead to exposure of proprietary business information, client data, pricing, and negotiation terms. This could result in competitive disadvantage, reputational damage, and potential regulatory non-compliance, especially under GDPR where unauthorized access to personal or business data is a serious concern. The impact is heightened for organizations in sectors with strict confidentiality requirements such as finance, legal, and government contractors. Since the vulnerability requires authentication but no elevated privileges, any compromised or insider user account could be leveraged to exploit this flaw. The absence of known exploits in the wild suggests limited immediate threat, but the ease of exploitation and high impact make it a critical issue to address promptly. The vulnerability does not affect system availability or integrity directly but could be a stepping stone for further attacks or data leakage.
Mitigation Recommendations
Organizations should prioritize upgrading BOLD Workplanner to version 2.5.25 or later once available, as this is expected to include the necessary authorization checks to fix the IDOR vulnerability. Until a patch is applied, implement strict access controls and monitoring on user accounts with access to the Workplanner system. Employ logging and alerting to detect unusual access patterns or attempts to access unauthorized contract identifiers. Conduct a thorough review of user permissions to ensure the principle of least privilege is enforced, limiting authenticated users to only the data necessary for their role. Consider implementing additional application-layer controls such as web application firewalls (WAFs) with custom rules to detect and block suspicious parameter tampering indicative of IDOR exploitation attempts. Regularly audit and rotate user credentials to reduce the risk of compromised accounts. Engage with the vendor for timely updates and security advisories. Finally, educate users about the importance of safeguarding their credentials to prevent unauthorized access.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- INCIBE
- Date Reserved
- 2025-04-16T09:09:36.725Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68dbbca396e5c3a04c0b3782
Added to database: 9/30/2025, 11:18:59 AM
Last enriched: 9/30/2025, 11:20:04 AM
Last updated: 9/30/2025, 2:13:24 PM
Views: 4
Related Threats
CVE-2025-56675: CWE-669 Incorrect Resource Transfer Between Spheres in EKEN video doorbell T6
LowCVE-2025-11195: CWE-20 Improper Input Validation in Rapid7 AppSpider Pro
LowCVE-2025-23293: CWE-306 Missing Authentication for Critical Function in NVIDIA DLS component of NVIDIA License System
HighCVE-2025-23292: CWE-943 Improper Neutralization of Special Elements in Data Query Logic in NVIDIA DLS component of NVIDIA License System
MediumCVE-2025-23291: CWE-312 Cleartext Storage of Sensitive Information in NVIDIA DLS component of NVIDIA License System
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.