CVE-2025-41099: CWE-639 Authorization Bypass Through User-Controlled Key in GLOBAL PLANNING SOLUTIONS S.L (GPS) BOLD Workplanner
CVE-2025-41099 is a high-severity Insecure Direct Object Reference (IDOR) vulnerability in GLOBAL PLANNING SOLUTIONS S. L's BOLD Workplanner versions prior to 2. 5. 25. It allows authenticated users to bypass authorization controls by manipulating user-controlled keys to access unauthorized permission lists. The vulnerability requires no user interaction and no elevated privileges beyond authentication. Exploitation can lead to unauthorized disclosure of sensitive permission data, impacting confidentiality. No known exploits are currently reported in the wild. European organizations using affected versions should prioritize patching and implement strict access validation to mitigate risks. Countries with significant deployments of BOLD Workplanner or critical infrastructure relying on it are at higher risk.
AI Analysis
Technical Summary
CVE-2025-41099 is an authorization bypass vulnerability classified under CWE-639, specifically an Insecure Direct Object Reference (IDOR) in the BOLD Workplanner software developed by GLOBAL PLANNING SOLUTIONS S.L (GPS). The flaw exists in versions prior to 2.5.25, where the application fails to adequately validate user input related to internal identifiers used to access permission lists. An authenticated user can exploit this vulnerability by manipulating these user-controlled keys to gain unauthorized access to permission data that should be restricted. This bypass does not require elevated privileges beyond authentication, nor does it require user interaction, making it easier to exploit remotely over the network. The vulnerability impacts confidentiality by exposing sensitive permission information, which could be leveraged for further attacks or privilege escalation. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high confidentiality impact (VC:H). No known exploits have been reported in the wild as of the publication date. The vulnerability highlights a critical weakness in access control mechanisms within the BOLD Workplanner platform, necessitating immediate remediation to prevent unauthorized data disclosure and potential downstream security risks.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive permission data within BOLD Workplanner deployments. Unauthorized access to permission lists can enable attackers or malicious insiders to map out user privileges, identify high-value targets, and potentially plan further privilege escalation or lateral movement within the network. This is particularly concerning for organizations relying on BOLD Workplanner for critical planning and scheduling functions, such as manufacturing, logistics, or infrastructure management. Exposure of permission data could lead to operational disruptions if attackers leverage the information to manipulate workflows or gain unauthorized control. Additionally, regulatory compliance risks arise under GDPR and other data protection laws if unauthorized access leads to personal or sensitive data exposure. The network-based exploitability and lack of required user interaction increase the likelihood of exploitation, especially in environments where authentication controls are weak or compromised. Although no active exploits are currently known, the high CVSS score and nature of the vulnerability warrant urgent attention to prevent potential future attacks.
Mitigation Recommendations
1. Upgrade BOLD Workplanner to version 2.5.25 or later immediately, as this version addresses the authorization validation flaw. 2. Implement strict server-side validation of all user-controlled input, especially internal identifiers used for access control decisions, to ensure users can only access resources they are authorized for. 3. Conduct a thorough audit of permission and access control configurations within BOLD Workplanner to detect and remediate any unauthorized access paths. 4. Enforce strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of compromised credentials being used to exploit this vulnerability. 5. Monitor logs and network traffic for unusual access patterns or attempts to access unauthorized permission lists. 6. Restrict network access to the BOLD Workplanner application to trusted internal networks or VPNs to limit exposure. 7. Educate users about the importance of safeguarding their credentials and reporting suspicious activity promptly. 8. Coordinate with GPS vendor support for any additional patches or security advisories related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium
CVE-2025-41099: CWE-639 Authorization Bypass Through User-Controlled Key in GLOBAL PLANNING SOLUTIONS S.L (GPS) BOLD Workplanner
Description
CVE-2025-41099 is a high-severity Insecure Direct Object Reference (IDOR) vulnerability in GLOBAL PLANNING SOLUTIONS S. L's BOLD Workplanner versions prior to 2. 5. 25. It allows authenticated users to bypass authorization controls by manipulating user-controlled keys to access unauthorized permission lists. The vulnerability requires no user interaction and no elevated privileges beyond authentication. Exploitation can lead to unauthorized disclosure of sensitive permission data, impacting confidentiality. No known exploits are currently reported in the wild. European organizations using affected versions should prioritize patching and implement strict access validation to mitigate risks. Countries with significant deployments of BOLD Workplanner or critical infrastructure relying on it are at higher risk.
AI-Powered Analysis
Technical Analysis
CVE-2025-41099 is an authorization bypass vulnerability classified under CWE-639, specifically an Insecure Direct Object Reference (IDOR) in the BOLD Workplanner software developed by GLOBAL PLANNING SOLUTIONS S.L (GPS). The flaw exists in versions prior to 2.5.25, where the application fails to adequately validate user input related to internal identifiers used to access permission lists. An authenticated user can exploit this vulnerability by manipulating these user-controlled keys to gain unauthorized access to permission data that should be restricted. This bypass does not require elevated privileges beyond authentication, nor does it require user interaction, making it easier to exploit remotely over the network. The vulnerability impacts confidentiality by exposing sensitive permission information, which could be leveraged for further attacks or privilege escalation. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high confidentiality impact (VC:H). No known exploits have been reported in the wild as of the publication date. The vulnerability highlights a critical weakness in access control mechanisms within the BOLD Workplanner platform, necessitating immediate remediation to prevent unauthorized data disclosure and potential downstream security risks.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive permission data within BOLD Workplanner deployments. Unauthorized access to permission lists can enable attackers or malicious insiders to map out user privileges, identify high-value targets, and potentially plan further privilege escalation or lateral movement within the network. This is particularly concerning for organizations relying on BOLD Workplanner for critical planning and scheduling functions, such as manufacturing, logistics, or infrastructure management. Exposure of permission data could lead to operational disruptions if attackers leverage the information to manipulate workflows or gain unauthorized control. Additionally, regulatory compliance risks arise under GDPR and other data protection laws if unauthorized access leads to personal or sensitive data exposure. The network-based exploitability and lack of required user interaction increase the likelihood of exploitation, especially in environments where authentication controls are weak or compromised. Although no active exploits are currently known, the high CVSS score and nature of the vulnerability warrant urgent attention to prevent potential future attacks.
Mitigation Recommendations
1. Upgrade BOLD Workplanner to version 2.5.25 or later immediately, as this version addresses the authorization validation flaw. 2. Implement strict server-side validation of all user-controlled input, especially internal identifiers used for access control decisions, to ensure users can only access resources they are authorized for. 3. Conduct a thorough audit of permission and access control configurations within BOLD Workplanner to detect and remediate any unauthorized access paths. 4. Enforce strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of compromised credentials being used to exploit this vulnerability. 5. Monitor logs and network traffic for unusual access patterns or attempts to access unauthorized permission lists. 6. Restrict network access to the BOLD Workplanner application to trusted internal networks or VPNs to limit exposure. 7. Educate users about the importance of safeguarding their credentials and reporting suspicious activity promptly. 8. Coordinate with GPS vendor support for any additional patches or security advisories related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- INCIBE
- Date Reserved
- 2025-04-16T09:09:37.997Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68dbbca396e5c3a04c0b378e
Added to database: 9/30/2025, 11:18:59 AM
Last enriched: 10/7/2025, 11:28:24 AM
Last updated: 11/12/2025, 2:39:57 AM
Views: 55
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-43205: An app may be able to bypass ASLR in Apple watchOS
UnknownCVE-2025-41116: CWE-653 in Grafana Labs Grafana Databricks Datasource Plugin
LowCVE-2025-3717: CWE-653 in Grafana Labs Grafana Snowflake Datasource Plugin
LowCVE-2025-64531: Use After Free (CWE-416) in Adobe Substance3D - Stager
HighCVE-2025-61835: Integer Underflow (Wrap or Wraparound) (CWE-191) in Adobe Substance3D - Stager
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.