Skip to main content

CVE-2025-41095: CWE-639 Authorization Bypass Through User-Controlled Key in GLOBAL PLANNING SOLUTIONS S.L (GPS) BOLD Workplanner

High
VulnerabilityCVE-2025-41095cvecve-2025-41095cwe-639
Published: Tue Sep 30 2025 (09/30/2025, 11:15:55 UTC)
Source: CVE Database V5
Vendor/Project: GLOBAL PLANNING SOLUTIONS S.L (GPS)
Product: BOLD Workplanner

Description

Insecure Direct Object Reference (IDOR) vulnerability in BOLD Workplanner in versions prior to 2.5.25 (4935b438f9b), consisting of a lack of adequate validation of user input, allowing an authenticated user to access to planning counter details using unauthorised internal identifiers.

AI-Powered Analysis

AILast updated: 09/30/2025, 11:19:50 UTC

Technical Analysis

CVE-2025-41095 is a high-severity authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the BOLD Workplanner product developed by GLOBAL PLANNING SOLUTIONS S.L (GPS). The vulnerability exists in versions prior to 2.5.25, specifically identified in version 2.5.24. It is an Insecure Direct Object Reference (IDOR) flaw caused by insufficient validation of user input when accessing internal planning counter details. An authenticated user with legitimate access to the system can manipulate internal identifiers (keys) to gain unauthorized access to planning counter details that they should not be able to view or modify. This bypasses the intended authorization controls, potentially exposing sensitive planning data. The vulnerability does not require user interaction and can be exploited remotely over the network without elevated privileges beyond authenticated user status. The CVSS v4.0 base score is 7.1, indicating a high severity level. The attack vector is network-based with low attack complexity and no privileges beyond authentication are required. The vulnerability impacts confidentiality significantly (high impact on confidentiality), but does not affect integrity or availability. No known exploits are currently reported in the wild, and no patches or mitigation links have been published at the time of reporting. The root cause is inadequate server-side validation of user-supplied keys used to reference internal objects, a common IDOR pattern. This vulnerability can lead to unauthorized disclosure of sensitive planning information, which may include scheduling, resource allocation, or other operational data managed by the BOLD Workplanner platform.

Potential Impact

For European organizations using BOLD Workplanner, this vulnerability poses a significant risk to the confidentiality of internal planning and scheduling data. Unauthorized access to planning counter details could lead to exposure of sensitive operational information, potentially undermining business processes, competitive advantage, and compliance with data protection regulations such as GDPR. In sectors where planning data is critical—such as manufacturing, logistics, transportation, and utilities—this could disrupt operational security and strategic planning. Although the vulnerability does not directly impact system integrity or availability, the unauthorized disclosure of sensitive information can facilitate further attacks or insider threats. Additionally, organizations may face regulatory and reputational damage if sensitive data is exposed due to inadequate access controls. The lack of known exploits currently limits immediate risk, but the ease of exploitation once authenticated means insider threats or compromised credentials could be leveraged to exploit this flaw.

Mitigation Recommendations

1. Immediate upgrade to BOLD Workplanner version 2.5.25 or later once available, as this version addresses the vulnerability by implementing proper validation of user-controlled keys. 2. Until patching is possible, restrict access to the BOLD Workplanner application to trusted users only and enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce risk of credential compromise. 3. Implement strict monitoring and logging of access to planning counter details to detect anomalous access patterns indicative of exploitation attempts. 4. Conduct a thorough review of user permissions and roles within the application to ensure least privilege principles are enforced, minimizing the number of users with access to sensitive planning data. 5. If feasible, apply web application firewall (WAF) rules to detect and block suspicious requests attempting to manipulate internal identifiers. 6. Educate users about the importance of safeguarding credentials and recognizing potential insider threat behaviors. 7. Coordinate with the vendor for timely receipt of patches and security advisories.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:09:37.996Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68dbbca396e5c3a04c0b3785

Added to database: 9/30/2025, 11:18:59 AM

Last enriched: 9/30/2025, 11:19:50 AM

Last updated: 10/1/2025, 12:09:20 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats