CVE-2025-41112: CWE-862 Missing Authorization in CanalDenuncia CanalDenuncia.app
A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameter 'web' in '/backend/api/buscarConfiguracionParametros2.php'.
AI Analysis
Technical Summary
CVE-2025-41112 identifies a critical security flaw in CanalDenuncia.app, a platform likely used for whistleblowing or reporting purposes. The vulnerability stems from CWE-862, a missing authorization control, which allows an attacker to bypass access controls and retrieve other users' information. Specifically, the flaw exists in the backend API endpoint '/backend/api/buscarConfiguracionParametros2.php', where the 'web' POST parameter is not properly validated for authorization. This means an unauthenticated attacker can craft a POST request to this endpoint and access sensitive data belonging to other users. The vulnerability affects version 0 of the product and carries a CVSS 4.0 base score of 8.7, indicating high severity. The vector metrics show the attack can be performed remotely over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and no authentication (AT:N). The impact is primarily on confidentiality (VC:H), with no impact on integrity or availability. No patches or known exploits are currently reported, but the lack of authorization checks represents a significant security gap that could be exploited once a proof-of-concept is developed or disclosed. The vulnerability was reserved in April 2025 and published in November 2025 by INCIBE, a Spanish cybersecurity agency, suggesting regional relevance. The absence of patch links indicates that remediation may not yet be available, emphasizing the need for immediate attention by users of the affected software.
Potential Impact
The primary impact of CVE-2025-41112 on European organizations is the unauthorized disclosure of sensitive user information managed by CanalDenuncia.app. Given that CanalDenuncia.app is presumably used for whistleblowing or confidential reporting, exposure of such data could lead to privacy violations, reputational damage, regulatory penalties under GDPR, and loss of trust in the reporting system. Attackers exploiting this vulnerability can access confidential reports or personal data without authentication, potentially leading to targeted attacks against whistleblowers or organizational insiders. The breach of confidentiality could also facilitate further attacks such as social engineering or blackmail. Since the vulnerability does not affect integrity or availability, the immediate risk is data leakage rather than system disruption. However, the sensitivity of the data involved elevates the overall risk profile. European entities relying on CanalDenuncia.app for compliance or internal investigations should consider this vulnerability a critical threat to their data protection obligations and operational security.
Mitigation Recommendations
To mitigate CVE-2025-41112, organizations should immediately audit the authorization mechanisms on the '/backend/api/buscarConfiguracionParametros2.php' endpoint, ensuring that all requests validate the identity and permissions of the requester before returning any user-specific data. Implement strict access control checks that verify the requesting user's rights to access the requested information. If possible, restrict access to this API endpoint to authenticated and authorized users only. Employ web application firewalls (WAFs) to detect and block suspicious POST requests targeting the 'web' parameter. Monitor logs for unusual access patterns or repeated unauthorized access attempts. Engage with the vendor or developer to obtain or request a security patch or update that addresses the missing authorization. Until a patch is available, consider isolating or disabling the vulnerable functionality if feasible. Additionally, conduct user awareness training to recognize potential phishing or social engineering attempts that could leverage leaked information. Regularly review and update security policies related to data access and API security to prevent similar issues.
Affected Countries
Spain, Germany, France, Italy, Netherlands, Belgium
CVE-2025-41112: CWE-862 Missing Authorization in CanalDenuncia CanalDenuncia.app
Description
A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameter 'web' in '/backend/api/buscarConfiguracionParametros2.php'.
AI-Powered Analysis
Technical Analysis
CVE-2025-41112 identifies a critical security flaw in CanalDenuncia.app, a platform likely used for whistleblowing or reporting purposes. The vulnerability stems from CWE-862, a missing authorization control, which allows an attacker to bypass access controls and retrieve other users' information. Specifically, the flaw exists in the backend API endpoint '/backend/api/buscarConfiguracionParametros2.php', where the 'web' POST parameter is not properly validated for authorization. This means an unauthenticated attacker can craft a POST request to this endpoint and access sensitive data belonging to other users. The vulnerability affects version 0 of the product and carries a CVSS 4.0 base score of 8.7, indicating high severity. The vector metrics show the attack can be performed remotely over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and no authentication (AT:N). The impact is primarily on confidentiality (VC:H), with no impact on integrity or availability. No patches or known exploits are currently reported, but the lack of authorization checks represents a significant security gap that could be exploited once a proof-of-concept is developed or disclosed. The vulnerability was reserved in April 2025 and published in November 2025 by INCIBE, a Spanish cybersecurity agency, suggesting regional relevance. The absence of patch links indicates that remediation may not yet be available, emphasizing the need for immediate attention by users of the affected software.
Potential Impact
The primary impact of CVE-2025-41112 on European organizations is the unauthorized disclosure of sensitive user information managed by CanalDenuncia.app. Given that CanalDenuncia.app is presumably used for whistleblowing or confidential reporting, exposure of such data could lead to privacy violations, reputational damage, regulatory penalties under GDPR, and loss of trust in the reporting system. Attackers exploiting this vulnerability can access confidential reports or personal data without authentication, potentially leading to targeted attacks against whistleblowers or organizational insiders. The breach of confidentiality could also facilitate further attacks such as social engineering or blackmail. Since the vulnerability does not affect integrity or availability, the immediate risk is data leakage rather than system disruption. However, the sensitivity of the data involved elevates the overall risk profile. European entities relying on CanalDenuncia.app for compliance or internal investigations should consider this vulnerability a critical threat to their data protection obligations and operational security.
Mitigation Recommendations
To mitigate CVE-2025-41112, organizations should immediately audit the authorization mechanisms on the '/backend/api/buscarConfiguracionParametros2.php' endpoint, ensuring that all requests validate the identity and permissions of the requester before returning any user-specific data. Implement strict access control checks that verify the requesting user's rights to access the requested information. If possible, restrict access to this API endpoint to authenticated and authorized users only. Employ web application firewalls (WAFs) to detect and block suspicious POST requests targeting the 'web' parameter. Monitor logs for unusual access patterns or repeated unauthorized access attempts. Engage with the vendor or developer to obtain or request a security patch or update that addresses the missing authorization. Until a patch is available, consider isolating or disabling the vulnerable functionality if feasible. Additionally, conduct user awareness training to recognize potential phishing or social engineering attempts that could leverage leaked information. Regularly review and update security policies related to data access and API security to prevent similar issues.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- INCIBE
- Date Reserved
- 2025-04-16T09:09:39.344Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6909fc133cfa4baba4c198b6
Added to database: 11/4/2025, 1:13:55 PM
Last enriched: 11/4/2025, 1:26:06 PM
Last updated: 11/5/2025, 7:34:39 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12388: CWE-918 Server-Side Request Forgery (SSRF) in bplugins Carousel Block – Responsive Image and Content Carousel
MediumCVE-2025-12384: CWE-862 Missing Authorization in bplugins Document Embedder – Embed PDFs, Word, Excel, and Other Files
HighCVE-2025-12139: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in princeahmed File Manager for Google Drive – Integrate Google Drive
HighCVE-2025-11917: CWE-918 Server-Side Request Forgery (SSRF) in etruel WPeMatico RSS Feed Fetcher
MediumCVE-2025-11373: CWE-862 Missing Authorization in averta Popup and Slider Builder by Depicter – Add Email collecting Popup, Popup Modal, Coupon Popup, Image Slider, Carousel Slider, Post Slider Carousel
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.