CVE-2025-47612: CWE-862 Missing Authorization in flowdee ClickWhale
Missing Authorization vulnerability in flowdee ClickWhale allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects ClickWhale: from n/a through 2.4.6.
AI Analysis
Technical Summary
CVE-2025-47612 is a medium-severity vulnerability classified under CWE-862 (Missing Authorization) affecting the ClickWhale product developed by flowdee, up to version 2.4.6. The vulnerability arises from improperly configured access control mechanisms, allowing an attacker with some level of privileges (PR:L - privileges required low) to exploit missing authorization checks in the application’s workflow. This flaw does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The vulnerability impacts the integrity and availability of the system but does not affect confidentiality. Specifically, an attacker can perform unauthorized actions that modify data or disrupt service availability due to the lack of proper authorization enforcement in certain application flows. The CVSS v3.1 base score is 5.4, indicating a medium severity level. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on May 7, 2025, and has been enriched by CISA, indicating recognition by cybersecurity authorities. The absence of a patch suggests that organizations using ClickWhale should prioritize mitigation and monitoring until an official fix is released.
Potential Impact
For European organizations, the impact of this vulnerability can be significant depending on the role of ClickWhale within their IT infrastructure. Since the flaw allows unauthorized modification and potential disruption of services, it could lead to data integrity issues, operational downtime, or service degradation. Organizations relying on ClickWhale for critical business processes or customer-facing applications may experience interruptions or unauthorized changes that could affect business continuity and trust. Although confidentiality is not directly impacted, the integrity and availability compromise could indirectly affect compliance with European data protection regulations such as GDPR, especially if service disruptions affect data processing activities. The medium severity rating suggests that while the threat is not immediately critical, it should not be ignored, particularly in sectors with high availability requirements such as finance, healthcare, and public services.
Mitigation Recommendations
Given the lack of an official patch, European organizations should implement compensating controls immediately. These include: 1) Restricting access to ClickWhale to only trusted and necessary users, minimizing the number of accounts with privileges that could exploit this vulnerability. 2) Implementing network segmentation and firewall rules to limit exposure of ClickWhale services to untrusted networks. 3) Enhancing monitoring and logging around ClickWhale’s access control and workflow activities to detect anomalous or unauthorized actions promptly. 4) Conducting thorough access reviews and tightening role-based access controls (RBAC) within ClickWhale to ensure least privilege principles are enforced. 5) Preparing incident response plans specific to potential exploitation scenarios of this vulnerability. Once a patch is released, organizations should prioritize timely deployment. Additionally, engaging with the vendor for updates and guidance is recommended.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-47612: CWE-862 Missing Authorization in flowdee ClickWhale
Description
Missing Authorization vulnerability in flowdee ClickWhale allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects ClickWhale: from n/a through 2.4.6.
AI-Powered Analysis
Technical Analysis
CVE-2025-47612 is a medium-severity vulnerability classified under CWE-862 (Missing Authorization) affecting the ClickWhale product developed by flowdee, up to version 2.4.6. The vulnerability arises from improperly configured access control mechanisms, allowing an attacker with some level of privileges (PR:L - privileges required low) to exploit missing authorization checks in the application’s workflow. This flaw does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The vulnerability impacts the integrity and availability of the system but does not affect confidentiality. Specifically, an attacker can perform unauthorized actions that modify data or disrupt service availability due to the lack of proper authorization enforcement in certain application flows. The CVSS v3.1 base score is 5.4, indicating a medium severity level. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on May 7, 2025, and has been enriched by CISA, indicating recognition by cybersecurity authorities. The absence of a patch suggests that organizations using ClickWhale should prioritize mitigation and monitoring until an official fix is released.
Potential Impact
For European organizations, the impact of this vulnerability can be significant depending on the role of ClickWhale within their IT infrastructure. Since the flaw allows unauthorized modification and potential disruption of services, it could lead to data integrity issues, operational downtime, or service degradation. Organizations relying on ClickWhale for critical business processes or customer-facing applications may experience interruptions or unauthorized changes that could affect business continuity and trust. Although confidentiality is not directly impacted, the integrity and availability compromise could indirectly affect compliance with European data protection regulations such as GDPR, especially if service disruptions affect data processing activities. The medium severity rating suggests that while the threat is not immediately critical, it should not be ignored, particularly in sectors with high availability requirements such as finance, healthcare, and public services.
Mitigation Recommendations
Given the lack of an official patch, European organizations should implement compensating controls immediately. These include: 1) Restricting access to ClickWhale to only trusted and necessary users, minimizing the number of accounts with privileges that could exploit this vulnerability. 2) Implementing network segmentation and firewall rules to limit exposure of ClickWhale services to untrusted networks. 3) Enhancing monitoring and logging around ClickWhale’s access control and workflow activities to detect anomalous or unauthorized actions promptly. 4) Conducting thorough access reviews and tightening role-based access controls (RBAC) within ClickWhale to ensure least privilege principles are enforced. 5) Preparing incident response plans specific to potential exploitation scenarios of this vulnerability. Once a patch is released, organizations should prioritize timely deployment. Additionally, engaging with the vendor for updates and guidance is recommended.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-07T10:44:34.647Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9818c4522896dcbd83c4
Added to database: 5/21/2025, 9:08:40 AM
Last enriched: 7/5/2025, 5:55:10 AM
Last updated: 7/24/2025, 7:14:12 AM
Views: 9
Related Threats
CVE-2025-8586: NULL Pointer Dereference in libav
MediumCVE-2025-51627: n/a
UnknownCVE-2025-50688: n/a
UnknownCVE-2025-51628: n/a
HighCVE-2025-8585: Double Free in libav
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.