Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41338: CWE-862 Missing Authorization in CanalDenuncia CanalDenuncia.app

0
High
VulnerabilityCVE-2025-41338cvecve-2025-41338cwe-862
Published: Tue Nov 04 2025 (11/04/2025, 13:16:37 UTC)
Source: CVE Database V5
Vendor/Project: CanalDenuncia
Product: CanalDenuncia.app

Description

A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameters 'id_denuncia' and 'id_user' in '/backend/api/buscarTestigoByIdDenunciaUsuario.php'.

AI-Powered Analysis

AILast updated: 11/04/2025, 13:37:45 UTC

Technical Analysis

CVE-2025-41338 is a missing authorization vulnerability (CWE-862) identified in CanalDenuncia.app, a platform likely used for whistleblowing or complaint management. The vulnerability arises because the backend API endpoint '/backend/api/buscarTestigoByIdDenunciaUsuario.php' accepts POST requests with parameters 'id_denuncia' and 'id_user' but does not verify whether the requester is authorized to access the data associated with these identifiers. This lack of authorization checks allows an unauthenticated attacker to craft POST requests that retrieve sensitive information belonging to other users, effectively bypassing access controls. The vulnerability is remotely exploitable over the network without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:N). The impact is primarily on confidentiality, as unauthorized data disclosure can occur, potentially exposing sensitive whistleblower or complaint information. The vulnerability has a high CVSS score of 8.7, reflecting its critical nature. No patches or known exploits are currently reported, but the absence of authorization checks represents a fundamental security flaw that must be addressed. The vulnerability was reserved in April 2025 and published in November 2025 by INCIBE, indicating recent discovery and disclosure. Given the nature of the product and the vulnerability, organizations using CanalDenuncia.app must urgently review and enhance their access control mechanisms to prevent data leaks.

Potential Impact

For European organizations, the impact of CVE-2025-41338 is significant due to the sensitive nature of data typically handled by whistleblowing platforms like CanalDenuncia.app. Unauthorized access to complaint or whistleblower information can lead to privacy violations, legal liabilities under GDPR, reputational damage, and erosion of trust in organizational compliance programs. Confidentiality breaches may expose identities of whistleblowers or sensitive case details, potentially endangering individuals and compromising investigations. The vulnerability’s ease of exploitation without authentication increases the risk of widespread data exposure. This can also affect regulatory compliance, as mishandling of personal or sensitive data can result in fines and sanctions. Furthermore, attackers could leverage the exposed information for targeted social engineering or further attacks. The lack of known exploits currently provides a window for remediation, but the high severity score underscores the urgency. European entities that rely on CanalDenuncia.app for internal reporting or regulatory compliance are particularly vulnerable, especially in sectors with strict whistleblower protections such as finance, healthcare, and public administration.

Mitigation Recommendations

1. Implement strict authorization checks on the backend API endpoint '/backend/api/buscarTestigoByIdDenunciaUsuario.php' to ensure that the requesting user has explicit permission to access the data associated with 'id_denuncia' and 'id_user'. 2. Enforce authentication mechanisms to restrict access to sensitive API endpoints, preventing unauthenticated requests. 3. Conduct a comprehensive access control audit across all API endpoints to identify and remediate similar missing authorization issues. 4. Employ role-based access control (RBAC) or attribute-based access control (ABAC) to tightly control data visibility based on user roles and relationships. 5. Implement logging and monitoring of API access to detect anomalous or unauthorized data retrieval attempts. 6. If possible, apply input validation and parameter sanitization to prevent manipulation of identifiers. 7. Coordinate with the vendor or development team to obtain patches or updates addressing this vulnerability. 8. Educate internal teams about the sensitivity of whistleblower data and the importance of secure API design. 9. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block suspicious POST requests targeting this endpoint. 10. Regularly review and update security policies to incorporate lessons learned from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:57:02.393Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690a0152dc8910934c3a8e97

Added to database: 11/4/2025, 1:36:18 PM

Last enriched: 11/4/2025, 1:37:45 PM

Last updated: 11/5/2025, 2:12:32 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats