Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41346: CWE-863 Incorrect Authorization in Informatica del Este WinPlus

0
Critical
VulnerabilityCVE-2025-41346cvecve-2025-41346cwe-863
Published: Tue Nov 18 2025 (11/18/2025, 10:04:11 UTC)
Source: CVE Database V5
Vendor/Project: Informatica del Este
Product: WinPlus

Description

Faulty authorization control in software WinPlus v24.11.27 by Informática del Este that allows another user to be impersonated simply by knowing their 'numerical ID', meaning that an attacker could compromise another user's account, thereby affecting the confidentiality, integrity, and availability of the data stored in the application.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/18/2026, 13:50:10 UTC

Technical Analysis

CVE-2025-41346 is an authorization bypass vulnerability classified under CWE-863, found in Informatica del Este's WinPlus software version 24.11.27. The vulnerability arises from faulty authorization controls that allow an attacker to impersonate another user simply by knowing their numerical user ID. This bypass requires no authentication, no user interaction, and can be exploited remotely over the network, making it highly accessible to attackers. By exploiting this flaw, an attacker can gain unauthorized access to another user's account, thereby compromising the confidentiality, integrity, and availability of the data managed by WinPlus. The vulnerability has been assigned a CVSS 4.0 base score of 9.3, indicating critical severity due to its network attack vector, low complexity, no privileges required, and no user interaction needed. Although no known exploits are currently reported in the wild, the vulnerability's nature makes it a prime target for attackers aiming to escalate privileges and access sensitive information. The lack of a patch at the time of publication increases the urgency for organizations to implement compensating controls. The vulnerability affects only version 24.11.27 of WinPlus, and it is crucial for users to monitor vendor communications for updates. The flaw's impact spans data confidentiality breaches, unauthorized data modification, and potential denial of service through account compromise.

Potential Impact

For European organizations, the impact of CVE-2025-41346 is significant. Unauthorized user impersonation can lead to data breaches involving sensitive personal, financial, or operational information, violating GDPR and other data protection regulations. Integrity of data can be compromised, potentially affecting business decisions and operational processes reliant on accurate information. Availability may also be impacted if attackers disrupt services or lock out legitimate users. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on WinPlus for data management or operational workflows face heightened risks. The breach of confidentiality and integrity could lead to regulatory fines, reputational damage, and operational downtime. Given the ease of exploitation and critical severity, attackers could rapidly escalate privileges and move laterally within networks, increasing the scope of impact. The absence of known exploits currently provides a limited window for proactive defense, but the threat landscape could evolve quickly once exploit code becomes available.

Mitigation Recommendations

European organizations should immediately audit their WinPlus installations to identify affected versions (24.11.27). Until a vendor patch is released, restrict network access to WinPlus servers using firewalls and network segmentation to limit exposure. Implement strict access controls and monitor logs for unusual activity indicative of impersonation attempts. Employ multi-factor authentication (MFA) at the application or network level to add an additional layer of defense, even though the vulnerability bypasses authorization. Conduct user awareness training to recognize suspicious account behavior. Prepare incident response plans specifically for potential exploitation scenarios involving WinPlus. Engage with Informatica del Este for timely updates and patches, and prioritize patch deployment once available. Consider deploying application-layer intrusion detection or prevention systems (IDS/IPS) to detect anomalous requests referencing numerical user IDs. Regularly back up critical data and verify restoration procedures to mitigate potential data integrity or availability impacts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:57:03.670Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691c47108ab8e3b5813b58ac

Added to database: 11/18/2025, 10:14:40 AM

Last enriched: 2/18/2026, 1:50:10 PM

Last updated: 3/25/2026, 10:29:20 PM

Views: 105

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses