Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41097: CWE-639 Authorization Bypass Through User-Controlled Key in GLOBAL PLANNING SOLUTIONS S.L (GPS) BOLD Workplanner

0
High
VulnerabilityCVE-2025-41097cvecve-2025-41097cwe-639
Published: Tue Sep 30 2025 (09/30/2025, 11:16:55 UTC)
Source: CVE Database V5
Vendor/Project: GLOBAL PLANNING SOLUTIONS S.L (GPS)
Product: BOLD Workplanner

Description

CVE-2025-41097 is a high-severity Insecure Direct Object Reference (IDOR) vulnerability in GLOBAL PLANNING SOLUTIONS S. L's BOLD Workplanner versions prior to 2. 5. 25. It allows an authenticated user to bypass authorization controls by manipulating user-controlled keys to access unauthorized basic employee details. Exploitation requires no user interaction and no elevated privileges beyond authentication. The vulnerability stems from inadequate validation of internal identifiers, enabling unauthorized data access. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to confidentiality. European organizations using affected versions of BOLD Workplanner should prioritize patching and implement strict access controls. Countries with higher adoption of GPS solutions and critical workforce management needs are at greater risk.

AI-Powered Analysis

AILast updated: 10/07/2025, 11:28:01 UTC

Technical Analysis

CVE-2025-41097 is an authorization bypass vulnerability classified under CWE-639, specifically an Insecure Direct Object Reference (IDOR) flaw found in BOLD Workplanner, a workforce management product by GLOBAL PLANNING SOLUTIONS S.L (GPS). The vulnerability affects versions prior to 2.5.25, where the application fails to properly validate user-supplied internal identifiers when accessing employee data. Authenticated users can manipulate these identifiers to gain unauthorized access to basic employee details, bypassing intended authorization checks. The vulnerability does not require elevated privileges beyond authentication and does not need user interaction, making it easier to exploit remotely over the network. The CVSS 4.0 score of 7.1 reflects a high severity due to the network attack vector, low attack complexity, and no requirement for user interaction or elevated privileges. The impact is primarily on confidentiality, as unauthorized disclosure of employee information can occur. No known exploits have been reported in the wild as of the publication date, but the vulnerability represents a significant risk if left unpatched. The root cause lies in insufficient input validation and access control enforcement within the application logic. This vulnerability highlights the importance of robust authorization checks and secure handling of internal object references in web applications managing sensitive personnel data.

Potential Impact

For European organizations, the unauthorized access to employee details can lead to privacy violations, non-compliance with GDPR regulations, and potential insider threat exploitation. Disclosure of employee information may include personally identifiable information (PII), which can be leveraged for social engineering, identity theft, or further attacks. Organizations relying on BOLD Workplanner for workforce scheduling and management may face operational risks if trust in the system's confidentiality is compromised. Additionally, regulatory fines and reputational damage could result from breaches of employee data privacy. The vulnerability's ease of exploitation by any authenticated user increases the risk, especially in environments with many users or weak authentication controls. Since BOLD Workplanner is used in sectors requiring strict workforce management, such as manufacturing, logistics, and services, the impact could extend to critical business functions and supply chain operations within Europe.

Mitigation Recommendations

The primary mitigation is to upgrade BOLD Workplanner to version 2.5.25 or later, where the vulnerability has been addressed. Until patching is possible, organizations should implement strict role-based access controls (RBAC) to limit authenticated users' access to employee data only to those with a legitimate need. Conduct thorough audits of user permissions and monitor access logs for unusual activity involving employee data queries. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests attempting to manipulate internal identifiers. Enhance input validation on the server side to reject unauthorized or malformed identifiers. Educate users about the importance of safeguarding their credentials to prevent unauthorized access. Finally, coordinate with GPS support for any available interim security advisories or workarounds and maintain incident response readiness to quickly address any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:09:37.996Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68dbbca396e5c3a04c0b378b

Added to database: 9/30/2025, 11:18:59 AM

Last enriched: 10/7/2025, 11:28:01 AM

Last updated: 11/12/2025, 12:24:12 PM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats