CVE-2025-41345: CWE-862 Missing Authorization in CanalDenuncia CanalDenuncia.app
A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameters 'id_denuncia' and 'id_user' in '/backend/api/buscarDenunciasById.php'.
AI Analysis
Technical Summary
CVE-2025-41345 is a vulnerability classified under CWE-862 (Missing Authorization) found in CanalDenuncia.app, a platform likely used for managing whistleblower reports or complaints. The vulnerability exists in the backend API endpoint '/backend/api/buscarDenunciasById.php', which processes POST requests containing parameters 'id_denuncia' (complaint/report ID) and 'id_user' (user ID). Due to missing authorization checks, the application fails to verify whether the requesting user is permitted to access the data associated with these parameters. Consequently, an attacker can craft POST requests with arbitrary 'id_denuncia' and 'id_user' values to retrieve sensitive information belonging to other users without authentication or user interaction. The CVSS 4.0 score of 8.7 reflects a high-severity rating, with an attack vector of network (remote exploitation), low attack complexity, no privileges or user interaction required, and a high impact on confidentiality. The vulnerability does not affect integrity or availability but poses a significant risk of sensitive data leakage. No patches or known exploits are currently reported, indicating a window for proactive mitigation. The vulnerability was reserved in April 2025 and published in November 2025, suggesting recent discovery and disclosure. The lack of authorization controls in a sensitive application handling whistleblower data could lead to serious privacy breaches and undermine trust in the platform.
Potential Impact
For European organizations, the impact of CVE-2025-41345 is substantial due to the sensitive nature of data managed by CanalDenuncia.app, which likely includes whistleblower reports, complaints, or other confidential user submissions. Unauthorized access to such data can lead to privacy violations, regulatory non-compliance (e.g., GDPR breaches), reputational damage, and potential legal consequences. The exposure of whistleblower identities or complaint details could deter reporting of misconduct and weaken organizational governance. Since the vulnerability allows remote exploitation without authentication or user interaction, attackers can automate data harvesting at scale, increasing the risk of mass data breaches. This could also facilitate targeted attacks or blackmail against individuals whose information is exposed. The confidentiality impact is high, while integrity and availability remain unaffected. Organizations relying on CanalDenuncia.app must consider the risk of data leakage and the potential for cascading effects on employee trust and regulatory scrutiny.
Mitigation Recommendations
To mitigate CVE-2025-41345, organizations should immediately implement strict authorization checks on the '/backend/api/buscarDenunciasById.php' endpoint. This includes verifying that the authenticated user has the appropriate permissions to access the requested 'id_denuncia' and 'id_user' data before responding. If authentication is not currently enforced, it must be introduced as a prerequisite for any data access. Employ role-based access control (RBAC) or attribute-based access control (ABAC) mechanisms to ensure fine-grained permission validation. Additionally, input validation should be enhanced to prevent manipulation of parameters to access unauthorized records. Logging and monitoring of access to this endpoint should be enabled to detect suspicious activity. If a patch from the vendor becomes available, it should be applied promptly. Until then, consider deploying web application firewalls (WAFs) with custom rules to block anomalous POST requests targeting this endpoint with unexpected parameter values. Conduct security audits and penetration tests focused on authorization controls in the application. Finally, educate users and administrators about the risks and encourage reporting of suspicious behavior.
Affected Countries
Spain, Germany, France, Italy, Netherlands, Belgium
CVE-2025-41345: CWE-862 Missing Authorization in CanalDenuncia CanalDenuncia.app
Description
A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameters 'id_denuncia' and 'id_user' in '/backend/api/buscarDenunciasById.php'.
AI-Powered Analysis
Technical Analysis
CVE-2025-41345 is a vulnerability classified under CWE-862 (Missing Authorization) found in CanalDenuncia.app, a platform likely used for managing whistleblower reports or complaints. The vulnerability exists in the backend API endpoint '/backend/api/buscarDenunciasById.php', which processes POST requests containing parameters 'id_denuncia' (complaint/report ID) and 'id_user' (user ID). Due to missing authorization checks, the application fails to verify whether the requesting user is permitted to access the data associated with these parameters. Consequently, an attacker can craft POST requests with arbitrary 'id_denuncia' and 'id_user' values to retrieve sensitive information belonging to other users without authentication or user interaction. The CVSS 4.0 score of 8.7 reflects a high-severity rating, with an attack vector of network (remote exploitation), low attack complexity, no privileges or user interaction required, and a high impact on confidentiality. The vulnerability does not affect integrity or availability but poses a significant risk of sensitive data leakage. No patches or known exploits are currently reported, indicating a window for proactive mitigation. The vulnerability was reserved in April 2025 and published in November 2025, suggesting recent discovery and disclosure. The lack of authorization controls in a sensitive application handling whistleblower data could lead to serious privacy breaches and undermine trust in the platform.
Potential Impact
For European organizations, the impact of CVE-2025-41345 is substantial due to the sensitive nature of data managed by CanalDenuncia.app, which likely includes whistleblower reports, complaints, or other confidential user submissions. Unauthorized access to such data can lead to privacy violations, regulatory non-compliance (e.g., GDPR breaches), reputational damage, and potential legal consequences. The exposure of whistleblower identities or complaint details could deter reporting of misconduct and weaken organizational governance. Since the vulnerability allows remote exploitation without authentication or user interaction, attackers can automate data harvesting at scale, increasing the risk of mass data breaches. This could also facilitate targeted attacks or blackmail against individuals whose information is exposed. The confidentiality impact is high, while integrity and availability remain unaffected. Organizations relying on CanalDenuncia.app must consider the risk of data leakage and the potential for cascading effects on employee trust and regulatory scrutiny.
Mitigation Recommendations
To mitigate CVE-2025-41345, organizations should immediately implement strict authorization checks on the '/backend/api/buscarDenunciasById.php' endpoint. This includes verifying that the authenticated user has the appropriate permissions to access the requested 'id_denuncia' and 'id_user' data before responding. If authentication is not currently enforced, it must be introduced as a prerequisite for any data access. Employ role-based access control (RBAC) or attribute-based access control (ABAC) mechanisms to ensure fine-grained permission validation. Additionally, input validation should be enhanced to prevent manipulation of parameters to access unauthorized records. Logging and monitoring of access to this endpoint should be enabled to detect suspicious activity. If a patch from the vendor becomes available, it should be applied promptly. Until then, consider deploying web application firewalls (WAFs) with custom rules to block anomalous POST requests targeting this endpoint with unexpected parameter values. Conduct security audits and penetration tests focused on authorization controls in the application. Finally, educate users and administrators about the risks and encourage reporting of suspicious behavior.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- INCIBE
- Date Reserved
- 2025-04-16T09:57:03.670Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 690a0154dc8910934c3a8ed4
Added to database: 11/4/2025, 1:36:20 PM
Last enriched: 11/4/2025, 1:39:39 PM
Last updated: 11/4/2025, 7:16:29 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64322: CWE-732 Incorrect Permission Assignment for Critical Resource in Salesforce Agentforce Vibes Extension
HighCVE-2025-12108: CWE-306 Missing Authentication for Critical Function in Survision License Plate Recognition Camera
CriticalCVE-2024-3159: Out of bounds memory access in Google Chrome
HighCVE-2024-3158: Use after free in Google Chrome
HighCVE-2024-3156: Inappropriate implementation in Google Chrome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.