CVE-2025-41095: CWE-639 Authorization Bypass Through User-Controlled Key in GLOBAL PLANNING SOLUTIONS S.L (GPS) BOLD Workplanner
CVE-2025-41095 is a high-severity Insecure Direct Object Reference (IDOR) vulnerability in GLOBAL PLANNING SOLUTIONS S. L's BOLD Workplanner versions prior to 2. 5. 25. It allows authenticated users to bypass authorization controls by manipulating user-controlled keys to access unauthorized planning counter details. Exploitation requires no user interaction and no elevated privileges beyond authentication. The vulnerability stems from inadequate validation of user input related to internal identifiers. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to confidentiality due to unauthorized data access. European organizations using affected versions should prioritize patching and implement strict access control validation. Countries with higher adoption of GPS BOLD Workplanner, especially those with critical planning operations, are at greater risk.
AI Analysis
Technical Summary
CVE-2025-41095 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the BOLD Workplanner product by GLOBAL PLANNING SOLUTIONS S.L (GPS). The flaw exists in versions prior to 2.5.25, where the application fails to properly validate user input related to internal identifiers used to access planning counter details. This lack of validation allows an authenticated user to manipulate these identifiers and gain unauthorized access to sensitive planning data that should be restricted. The vulnerability is categorized as an Insecure Direct Object Reference (IDOR), a common web application security issue where direct access to objects is not properly controlled. According to the CVSS 4.0 vector, the attack vector is network-based (AV:N), requires low attack complexity (AC:L), no privileges (PR:L means low privileges but authentication is required), no user interaction (UI:N), and impacts confidentiality highly (VC:H) without affecting integrity or availability. The vulnerability does not require elevated privileges beyond authentication, nor does it require user interaction, making it relatively straightforward to exploit once authenticated. No patches or exploits are currently publicly available, but the risk remains significant due to the sensitive nature of planning data and the potential for unauthorized data disclosure. The vulnerability was reserved in April 2025 and published in September 2025, indicating recent discovery and disclosure. The lack of patch links suggests that remediation may be pending or that users must upgrade to a fixed version (2.5.25 or later) once available. The vulnerability's presence in a planning tool used in operational environments could lead to unauthorized access to strategic or operational planning information, which could have downstream impacts on business operations and competitive advantage.
Potential Impact
For European organizations, the primary impact of CVE-2025-41095 is unauthorized disclosure of sensitive planning data, which can compromise confidentiality. This could affect operational security, competitive positioning, and compliance with data protection regulations such as GDPR if personal or sensitive data is involved. Unauthorized access to planning counters may allow attackers or malicious insiders to glean insights into resource allocation, scheduling, or strategic initiatives, potentially leading to industrial espionage or operational disruption. Although the vulnerability does not directly impact system integrity or availability, the exposure of sensitive information can have cascading effects on trust, regulatory compliance, and business continuity. Organizations in sectors relying heavily on detailed planning tools—such as manufacturing, logistics, utilities, and critical infrastructure—may face heightened risks. Furthermore, the requirement for authentication means that insider threats or compromised credentials could be leveraged to exploit this vulnerability. The absence of known exploits in the wild currently reduces immediate risk, but the high CVSS score and straightforward exploitation path necessitate proactive mitigation to prevent future attacks.
Mitigation Recommendations
European organizations using BOLD Workplanner should immediately verify their software version and plan to upgrade to version 2.5.25 or later once available, as this version addresses the vulnerability. In the interim, organizations should implement strict server-side authorization checks to validate user permissions against requested internal identifiers, ensuring that users cannot access data outside their scope. Conduct thorough access control reviews and enforce the principle of least privilege for all authenticated users. Monitor application logs for anomalous access patterns, such as requests for planning counters outside a user's normal scope or repeated access attempts to unauthorized resources. Employ multi-factor authentication (MFA) to reduce the risk of credential compromise. Additionally, consider network segmentation to limit access to the planning tool to trusted users and systems. Security teams should prepare incident response plans to quickly address any detected exploitation attempts. Finally, engage with the vendor for timely updates and patches, and participate in information sharing forums to stay informed about emerging threats related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-41095: CWE-639 Authorization Bypass Through User-Controlled Key in GLOBAL PLANNING SOLUTIONS S.L (GPS) BOLD Workplanner
Description
CVE-2025-41095 is a high-severity Insecure Direct Object Reference (IDOR) vulnerability in GLOBAL PLANNING SOLUTIONS S. L's BOLD Workplanner versions prior to 2. 5. 25. It allows authenticated users to bypass authorization controls by manipulating user-controlled keys to access unauthorized planning counter details. Exploitation requires no user interaction and no elevated privileges beyond authentication. The vulnerability stems from inadequate validation of user input related to internal identifiers. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to confidentiality due to unauthorized data access. European organizations using affected versions should prioritize patching and implement strict access control validation. Countries with higher adoption of GPS BOLD Workplanner, especially those with critical planning operations, are at greater risk.
AI-Powered Analysis
Technical Analysis
CVE-2025-41095 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the BOLD Workplanner product by GLOBAL PLANNING SOLUTIONS S.L (GPS). The flaw exists in versions prior to 2.5.25, where the application fails to properly validate user input related to internal identifiers used to access planning counter details. This lack of validation allows an authenticated user to manipulate these identifiers and gain unauthorized access to sensitive planning data that should be restricted. The vulnerability is categorized as an Insecure Direct Object Reference (IDOR), a common web application security issue where direct access to objects is not properly controlled. According to the CVSS 4.0 vector, the attack vector is network-based (AV:N), requires low attack complexity (AC:L), no privileges (PR:L means low privileges but authentication is required), no user interaction (UI:N), and impacts confidentiality highly (VC:H) without affecting integrity or availability. The vulnerability does not require elevated privileges beyond authentication, nor does it require user interaction, making it relatively straightforward to exploit once authenticated. No patches or exploits are currently publicly available, but the risk remains significant due to the sensitive nature of planning data and the potential for unauthorized data disclosure. The vulnerability was reserved in April 2025 and published in September 2025, indicating recent discovery and disclosure. The lack of patch links suggests that remediation may be pending or that users must upgrade to a fixed version (2.5.25 or later) once available. The vulnerability's presence in a planning tool used in operational environments could lead to unauthorized access to strategic or operational planning information, which could have downstream impacts on business operations and competitive advantage.
Potential Impact
For European organizations, the primary impact of CVE-2025-41095 is unauthorized disclosure of sensitive planning data, which can compromise confidentiality. This could affect operational security, competitive positioning, and compliance with data protection regulations such as GDPR if personal or sensitive data is involved. Unauthorized access to planning counters may allow attackers or malicious insiders to glean insights into resource allocation, scheduling, or strategic initiatives, potentially leading to industrial espionage or operational disruption. Although the vulnerability does not directly impact system integrity or availability, the exposure of sensitive information can have cascading effects on trust, regulatory compliance, and business continuity. Organizations in sectors relying heavily on detailed planning tools—such as manufacturing, logistics, utilities, and critical infrastructure—may face heightened risks. Furthermore, the requirement for authentication means that insider threats or compromised credentials could be leveraged to exploit this vulnerability. The absence of known exploits in the wild currently reduces immediate risk, but the high CVSS score and straightforward exploitation path necessitate proactive mitigation to prevent future attacks.
Mitigation Recommendations
European organizations using BOLD Workplanner should immediately verify their software version and plan to upgrade to version 2.5.25 or later once available, as this version addresses the vulnerability. In the interim, organizations should implement strict server-side authorization checks to validate user permissions against requested internal identifiers, ensuring that users cannot access data outside their scope. Conduct thorough access control reviews and enforce the principle of least privilege for all authenticated users. Monitor application logs for anomalous access patterns, such as requests for planning counters outside a user's normal scope or repeated access attempts to unauthorized resources. Employ multi-factor authentication (MFA) to reduce the risk of credential compromise. Additionally, consider network segmentation to limit access to the planning tool to trusted users and systems. Security teams should prepare incident response plans to quickly address any detected exploitation attempts. Finally, engage with the vendor for timely updates and patches, and participate in information sharing forums to stay informed about emerging threats related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- INCIBE
- Date Reserved
- 2025-04-16T09:09:37.996Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68dbbca396e5c3a04c0b3785
Added to database: 9/30/2025, 11:18:59 AM
Last enriched: 10/7/2025, 11:27:36 AM
Last updated: 11/14/2025, 4:47:31 AM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13161: CWE-23 Relative Path Traversal in IQ Service International IQ-Support
HighCVE-2025-13160: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in IQ Service International IQ-Support
MediumCVE-2025-9479: Out of bounds read in Google Chrome
UnknownCVE-2025-13107: Inappropriate implementation in Google Chrome
UnknownCVE-2025-13102: Inappropriate implementation in Google Chrome
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.