Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41112: CWE-862 Missing Authorization in CanalDenuncia CanalDenuncia.app

0
High
VulnerabilityCVE-2025-41112cvecve-2025-41112cwe-862
Published: Tue Nov 04 2025 (11/04/2025, 13:09:53 UTC)
Source: CVE Database V5
Vendor/Project: CanalDenuncia
Product: CanalDenuncia.app

Description

A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameter 'web' in '/backend/api/buscarConfiguracionParametros2.php'.

AI-Powered Analysis

AILast updated: 11/04/2025, 13:26:06 UTC

Technical Analysis

CVE-2025-41112 identifies a critical security flaw in CanalDenuncia.app, a platform likely used for whistleblowing or reporting purposes. The vulnerability stems from CWE-862, a missing authorization control, which allows an attacker to bypass access controls and retrieve other users' information. Specifically, the flaw exists in the backend API endpoint '/backend/api/buscarConfiguracionParametros2.php', where the 'web' POST parameter is not properly validated for authorization. This means an unauthenticated attacker can craft a POST request to this endpoint and access sensitive data belonging to other users. The vulnerability affects version 0 of the product and carries a CVSS 4.0 base score of 8.7, indicating high severity. The vector metrics show the attack can be performed remotely over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and no authentication (AT:N). The impact is primarily on confidentiality (VC:H), with no impact on integrity or availability. No patches or known exploits are currently reported, but the lack of authorization checks represents a significant security gap that could be exploited once a proof-of-concept is developed or disclosed. The vulnerability was reserved in April 2025 and published in November 2025 by INCIBE, a Spanish cybersecurity agency, suggesting regional relevance. The absence of patch links indicates that remediation may not yet be available, emphasizing the need for immediate attention by users of the affected software.

Potential Impact

The primary impact of CVE-2025-41112 on European organizations is the unauthorized disclosure of sensitive user information managed by CanalDenuncia.app. Given that CanalDenuncia.app is presumably used for whistleblowing or confidential reporting, exposure of such data could lead to privacy violations, reputational damage, regulatory penalties under GDPR, and loss of trust in the reporting system. Attackers exploiting this vulnerability can access confidential reports or personal data without authentication, potentially leading to targeted attacks against whistleblowers or organizational insiders. The breach of confidentiality could also facilitate further attacks such as social engineering or blackmail. Since the vulnerability does not affect integrity or availability, the immediate risk is data leakage rather than system disruption. However, the sensitivity of the data involved elevates the overall risk profile. European entities relying on CanalDenuncia.app for compliance or internal investigations should consider this vulnerability a critical threat to their data protection obligations and operational security.

Mitigation Recommendations

To mitigate CVE-2025-41112, organizations should immediately audit the authorization mechanisms on the '/backend/api/buscarConfiguracionParametros2.php' endpoint, ensuring that all requests validate the identity and permissions of the requester before returning any user-specific data. Implement strict access control checks that verify the requesting user's rights to access the requested information. If possible, restrict access to this API endpoint to authenticated and authorized users only. Employ web application firewalls (WAFs) to detect and block suspicious POST requests targeting the 'web' parameter. Monitor logs for unusual access patterns or repeated unauthorized access attempts. Engage with the vendor or developer to obtain or request a security patch or update that addresses the missing authorization. Until a patch is available, consider isolating or disabling the vulnerable functionality if feasible. Additionally, conduct user awareness training to recognize potential phishing or social engineering attempts that could leverage leaked information. Regularly review and update security policies related to data access and API security to prevent similar issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:09:39.344Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6909fc133cfa4baba4c198b6

Added to database: 11/4/2025, 1:13:55 PM

Last enriched: 11/4/2025, 1:26:06 PM

Last updated: 11/5/2025, 7:34:39 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats