CVE-2025-41111: CWE-862 Missing Authorization in CanalDenuncia CanalDenuncia.app
A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameter 'id_denuncia' in '/backend/api/buscarComentariosByDenuncia.php'.
AI Analysis
Technical Summary
CVE-2025-41111 is a missing authorization vulnerability classified under CWE-862 found in the CanalDenuncia.app platform, specifically in the API endpoint '/backend/api/buscarComentariosByDenuncia.php'. The vulnerability arises because the application fails to verify whether the requesting user is authorized to access the data associated with the 'id_denuncia' parameter. An attacker can send a crafted POST request with arbitrary 'id_denuncia' values to retrieve comments or information tied to other users' reports without any authentication or privileges. The vulnerability has a CVSS 4.0 base score of 8.7, indicating high severity due to its network attack vector, lack of required authentication, and the high impact on confidentiality. The flaw does not affect integrity or availability but exposes sensitive user information, potentially including whistleblower reports or complaints, which can lead to privacy violations and reputational damage. No patches or fixes have been published yet, and no exploits are known in the wild, but the vulnerability's simplicity and severity make it a critical risk. The issue was reserved in April 2025 and published in November 2025 by INCIBE, highlighting the need for urgent attention by CanalDenuncia.app users and administrators.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive information submitted through CanalDenuncia.app, which is often used for whistleblowing or reporting misconduct. Unauthorized data access can lead to privacy breaches, regulatory non-compliance with GDPR, and loss of trust from users and stakeholders. Organizations relying on CanalDenuncia.app for compliance or internal reporting may face legal and financial consequences if sensitive data is exposed. The vulnerability's ease of exploitation without authentication increases the likelihood of attacks, potentially by malicious insiders or external threat actors. Additionally, the exposure of whistleblower information can deter reporting and undermine organizational transparency. The lack of patches means organizations must rely on compensating controls until a fix is available. This threat is particularly impactful in sectors with strict data protection requirements such as finance, healthcare, and government institutions across Europe.
Mitigation Recommendations
1. Immediately implement strict access control mechanisms on the '/backend/api/buscarComentariosByDenuncia.php' endpoint to ensure that only authorized users can query data related to their own 'id_denuncia'. 2. Introduce robust authorization checks in the backend to validate user permissions before returning any data. 3. Employ input validation and parameter sanitization to prevent unauthorized parameter manipulation. 4. Enable detailed logging and monitoring of API requests to detect unusual access patterns or attempts to access other users' data. 5. If possible, restrict API access via network segmentation or VPNs to trusted users only until a patch is released. 6. Conduct a thorough security audit of the entire CanalDenuncia.app codebase to identify and remediate similar authorization issues. 7. Educate users and administrators about the risk and encourage reporting of suspicious activity. 8. Coordinate with the vendor for timely patch deployment once available. 9. Consider deploying Web Application Firewalls (WAF) with custom rules to block suspicious POST requests targeting the vulnerable endpoint. 10. Review and update privacy policies and incident response plans to prepare for potential data breach scenarios.
Affected Countries
Spain, Germany, France, Italy, Netherlands, Belgium
CVE-2025-41111: CWE-862 Missing Authorization in CanalDenuncia CanalDenuncia.app
Description
A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameter 'id_denuncia' in '/backend/api/buscarComentariosByDenuncia.php'.
AI-Powered Analysis
Technical Analysis
CVE-2025-41111 is a missing authorization vulnerability classified under CWE-862 found in the CanalDenuncia.app platform, specifically in the API endpoint '/backend/api/buscarComentariosByDenuncia.php'. The vulnerability arises because the application fails to verify whether the requesting user is authorized to access the data associated with the 'id_denuncia' parameter. An attacker can send a crafted POST request with arbitrary 'id_denuncia' values to retrieve comments or information tied to other users' reports without any authentication or privileges. The vulnerability has a CVSS 4.0 base score of 8.7, indicating high severity due to its network attack vector, lack of required authentication, and the high impact on confidentiality. The flaw does not affect integrity or availability but exposes sensitive user information, potentially including whistleblower reports or complaints, which can lead to privacy violations and reputational damage. No patches or fixes have been published yet, and no exploits are known in the wild, but the vulnerability's simplicity and severity make it a critical risk. The issue was reserved in April 2025 and published in November 2025 by INCIBE, highlighting the need for urgent attention by CanalDenuncia.app users and administrators.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive information submitted through CanalDenuncia.app, which is often used for whistleblowing or reporting misconduct. Unauthorized data access can lead to privacy breaches, regulatory non-compliance with GDPR, and loss of trust from users and stakeholders. Organizations relying on CanalDenuncia.app for compliance or internal reporting may face legal and financial consequences if sensitive data is exposed. The vulnerability's ease of exploitation without authentication increases the likelihood of attacks, potentially by malicious insiders or external threat actors. Additionally, the exposure of whistleblower information can deter reporting and undermine organizational transparency. The lack of patches means organizations must rely on compensating controls until a fix is available. This threat is particularly impactful in sectors with strict data protection requirements such as finance, healthcare, and government institutions across Europe.
Mitigation Recommendations
1. Immediately implement strict access control mechanisms on the '/backend/api/buscarComentariosByDenuncia.php' endpoint to ensure that only authorized users can query data related to their own 'id_denuncia'. 2. Introduce robust authorization checks in the backend to validate user permissions before returning any data. 3. Employ input validation and parameter sanitization to prevent unauthorized parameter manipulation. 4. Enable detailed logging and monitoring of API requests to detect unusual access patterns or attempts to access other users' data. 5. If possible, restrict API access via network segmentation or VPNs to trusted users only until a patch is released. 6. Conduct a thorough security audit of the entire CanalDenuncia.app codebase to identify and remediate similar authorization issues. 7. Educate users and administrators about the risk and encourage reporting of suspicious activity. 8. Coordinate with the vendor for timely patch deployment once available. 9. Consider deploying Web Application Firewalls (WAF) with custom rules to block suspicious POST requests targeting the vulnerable endpoint. 10. Review and update privacy policies and incident response plans to prepare for potential data breach scenarios.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- INCIBE
- Date Reserved
- 2025-04-16T09:09:39.344Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6909fc133cfa4baba4c198b3
Added to database: 11/4/2025, 1:13:55 PM
Last enriched: 11/4/2025, 1:26:15 PM
Last updated: 11/5/2025, 7:34:38 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12388: CWE-918 Server-Side Request Forgery (SSRF) in bplugins Carousel Block – Responsive Image and Content Carousel
MediumCVE-2025-12384: CWE-862 Missing Authorization in bplugins Document Embedder – Embed PDFs, Word, Excel, and Other Files
HighCVE-2025-12139: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in princeahmed File Manager for Google Drive – Integrate Google Drive
HighCVE-2025-11917: CWE-918 Server-Side Request Forgery (SSRF) in etruel WPeMatico RSS Feed Fetcher
MediumCVE-2025-11373: CWE-862 Missing Authorization in averta Popup and Slider Builder by Depicter – Add Email collecting Popup, Popup Modal, Coupon Popup, Image Slider, Carousel Slider, Post Slider Carousel
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.