Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41113: CWE-862 Missing Authorization in CanalDenuncia CanalDenuncia.app

0
High
VulnerabilityCVE-2025-41113cvecve-2025-41113cwe-862
Published: Tue Nov 04 2025 (11/04/2025, 13:10:12 UTC)
Source: CVE Database V5
Vendor/Project: CanalDenuncia
Product: CanalDenuncia.app

Description

A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameter 'id_denuncia' in '/backend/api/buscarDenunciaByPin.php'.

AI-Powered Analysis

AILast updated: 11/04/2025, 13:25:55 UTC

Technical Analysis

CVE-2025-41113 identifies a missing authorization vulnerability (CWE-862) in the CanalDenuncia.app platform, specifically in the backend API endpoint '/backend/api/buscarDenunciaByPin.php'. The vulnerability arises because the application fails to verify that the user making a POST request with the 'id_denuncia' parameter is authorized to access the corresponding complaint or report data. This lack of access control allows any attacker, without authentication or user interaction, to retrieve sensitive information belonging to other users simply by supplying different 'id_denuncia' values. The vulnerability affects version 0 of the product and was published on November 4, 2025. The CVSS v4.0 base score is 8.7, reflecting a high severity due to network attack vector, no required privileges or user interaction, and a high impact on confidentiality. The vulnerability does not affect integrity or availability but compromises sensitive data confidentiality, which is critical in whistleblowing or complaint management systems. No patches or known exploits are currently available, but the flaw's simplicity and impact make it a significant threat. The vulnerability was assigned by INCIBE, indicating recognition by a European cybersecurity authority. The absence of authorization checks in a sensitive application like CanalDenuncia.app could lead to unauthorized data disclosure, violating privacy regulations such as GDPR and undermining trust in whistleblower protection mechanisms.

Potential Impact

The primary impact of CVE-2025-41113 is the unauthorized disclosure of sensitive user information managed by CanalDenuncia.app. For European organizations, this can lead to severe privacy breaches, especially since whistleblowing platforms often handle confidential and legally sensitive reports. Exposure of such data can result in reputational damage, loss of stakeholder trust, and potential legal penalties under GDPR and other data protection laws. The vulnerability's exploitation requires no authentication, making it accessible to any remote attacker, increasing the risk of widespread data leaks. Additionally, the breach of whistleblower anonymity or sensitive complaint details could discourage reporting of wrongdoing, undermining organizational compliance and governance efforts. The lack of known exploits currently limits immediate risk, but the vulnerability's simplicity and high impact make it a prime target for attackers once exploit code becomes available. European entities relying on CanalDenuncia.app for regulatory compliance or internal reporting are particularly vulnerable to these impacts.

Mitigation Recommendations

To mitigate CVE-2025-41113, organizations should immediately audit and update the authorization logic in the CanalDenuncia.app backend API, ensuring that every request to '/backend/api/buscarDenunciaByPin.php' verifies the requesting user's permissions against the 'id_denuncia' resource. Implement role-based access control (RBAC) or attribute-based access control (ABAC) mechanisms to enforce strict data access policies. Conduct thorough code reviews and penetration testing focused on authorization checks across all API endpoints. Monitor application logs for unusual access patterns or repeated requests with varying 'id_denuncia' values that could indicate exploitation attempts. If possible, restrict API access to authenticated and authorized users only, and implement rate limiting to reduce brute-force attempts. Engage with the vendor or development team to obtain or develop patches addressing the vulnerability. Additionally, educate users and administrators about the risks of unauthorized data access and establish incident response plans to quickly address potential data breaches. Finally, ensure compliance with GDPR by notifying affected individuals and authorities if a breach occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:09:39.344Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6909fc133cfa4baba4c198b9

Added to database: 11/4/2025, 1:13:55 PM

Last enriched: 11/4/2025, 1:25:55 PM

Last updated: 11/5/2025, 6:56:04 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats