CVE-2025-48271: CWE-862 Missing Authorization in Leadinfo Leadinfo
Missing Authorization vulnerability in Leadinfo Leadinfo allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Leadinfo: from n/a through 1.1.
AI Analysis
Technical Summary
CVE-2025-48271 is a Missing Authorization vulnerability (CWE-862) identified in the Leadinfo product, affecting versions up to 1.1. This vulnerability arises due to incorrectly configured access control security levels, allowing unauthorized users to perform actions or access resources that should be restricted. The vulnerability is exploitable remotely (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it relatively easy to exploit. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component itself. The vulnerability does not impact confidentiality (C:N) but affects integrity (I:L) and availability (A:L), indicating that unauthorized modifications and disruptions to service are possible. Although no public exploits are currently known, the medium CVSS score of 6.5 reflects a significant risk that could lead to service degradation or unauthorized changes within the Leadinfo platform. Leadinfo is a lead generation and visitor identification tool used by businesses to track and analyze website visitors, which means exploitation could disrupt business operations or lead to unauthorized data manipulation within the platform.
Potential Impact
For European organizations using Leadinfo, this vulnerability could lead to unauthorized modifications of lead data or disruption of lead tracking services, impacting sales and marketing operations. While confidentiality is not directly compromised, integrity and availability issues could undermine trust in the data and cause operational delays. Organizations relying heavily on Leadinfo for customer insights may experience degraded service quality or incorrect data analytics, affecting decision-making processes. Additionally, if attackers leverage this vulnerability to disrupt services, it could lead to financial losses and reputational damage. Given the remote and no-authentication exploitation vector, attackers could target multiple organizations indiscriminately, increasing the risk for European businesses using this software.
Mitigation Recommendations
Since no patches are currently available, European organizations should implement compensating controls immediately. These include restricting network access to the Leadinfo management interfaces via IP whitelisting or VPNs, enforcing strict internal access controls, and monitoring logs for unusual access patterns or unauthorized changes. Organizations should also consider temporarily disabling or limiting Leadinfo functionalities that require authorization until a patch is released. Regularly reviewing user permissions and conducting internal audits of access control configurations can help identify and remediate misconfigurations. Additionally, organizations should maintain up-to-date backups of Leadinfo data to enable recovery in case of integrity or availability compromise. Once a patch is released, prompt application is critical to fully mitigate the vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium, Sweden
CVE-2025-48271: CWE-862 Missing Authorization in Leadinfo Leadinfo
Description
Missing Authorization vulnerability in Leadinfo Leadinfo allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Leadinfo: from n/a through 1.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-48271 is a Missing Authorization vulnerability (CWE-862) identified in the Leadinfo product, affecting versions up to 1.1. This vulnerability arises due to incorrectly configured access control security levels, allowing unauthorized users to perform actions or access resources that should be restricted. The vulnerability is exploitable remotely (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it relatively easy to exploit. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component itself. The vulnerability does not impact confidentiality (C:N) but affects integrity (I:L) and availability (A:L), indicating that unauthorized modifications and disruptions to service are possible. Although no public exploits are currently known, the medium CVSS score of 6.5 reflects a significant risk that could lead to service degradation or unauthorized changes within the Leadinfo platform. Leadinfo is a lead generation and visitor identification tool used by businesses to track and analyze website visitors, which means exploitation could disrupt business operations or lead to unauthorized data manipulation within the platform.
Potential Impact
For European organizations using Leadinfo, this vulnerability could lead to unauthorized modifications of lead data or disruption of lead tracking services, impacting sales and marketing operations. While confidentiality is not directly compromised, integrity and availability issues could undermine trust in the data and cause operational delays. Organizations relying heavily on Leadinfo for customer insights may experience degraded service quality or incorrect data analytics, affecting decision-making processes. Additionally, if attackers leverage this vulnerability to disrupt services, it could lead to financial losses and reputational damage. Given the remote and no-authentication exploitation vector, attackers could target multiple organizations indiscriminately, increasing the risk for European businesses using this software.
Mitigation Recommendations
Since no patches are currently available, European organizations should implement compensating controls immediately. These include restricting network access to the Leadinfo management interfaces via IP whitelisting or VPNs, enforcing strict internal access controls, and monitoring logs for unusual access patterns or unauthorized changes. Organizations should also consider temporarily disabling or limiting Leadinfo functionalities that require authorization until a patch is released. Regularly reviewing user permissions and conducting internal audits of access control configurations can help identify and remediate misconfigurations. Additionally, organizations should maintain up-to-date backups of Leadinfo data to enable recovery in case of integrity or availability compromise. Once a patch is released, prompt application is critical to fully mitigate the vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-19T14:13:24.501Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68306f8e0acd01a249272479
Added to database: 5/23/2025, 12:52:30 PM
Last enriched: 7/8/2025, 8:24:42 PM
Last updated: 7/30/2025, 4:09:17 PM
Views: 12
Related Threats
CVE-2025-25229: Vulnerability in Omnissa Omnissa Workspace ONE UEM
MediumCVE-2025-25231: Vulnerability in Omnissa Omnissa Workspace ONE UEM
HighCVE-2025-53187: CWE-94 Improper Control of Generation of Code ('Code Injection') in ABB ASPECT
HighCVE-2025-54063: CWE-94: Improper Control of Generation of Code ('Code Injection') in CherryHQ cherry-studio
HighCVE-2025-1500: CWE-434 Unrestricted Upload of File with Dangerous Type in IBM Maximo Application Suite
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.