CVE-2025-48271: CWE-862 Missing Authorization in Leadinfo Leadinfo
Missing Authorization vulnerability in Leadinfo Leadinfo allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Leadinfo: from n/a through 1.1.
AI Analysis
Technical Summary
CVE-2025-48271 is a Missing Authorization vulnerability (CWE-862) identified in the Leadinfo product, affecting versions up to 1.1. This vulnerability arises due to incorrectly configured access control security levels, allowing unauthorized users to perform actions or access resources that should be restricted. The vulnerability is exploitable remotely (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it relatively easy to exploit. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component itself. The vulnerability does not impact confidentiality (C:N) but affects integrity (I:L) and availability (A:L), indicating that unauthorized modifications and disruptions to service are possible. Although no public exploits are currently known, the medium CVSS score of 6.5 reflects a significant risk that could lead to service degradation or unauthorized changes within the Leadinfo platform. Leadinfo is a lead generation and visitor identification tool used by businesses to track and analyze website visitors, which means exploitation could disrupt business operations or lead to unauthorized data manipulation within the platform.
Potential Impact
For European organizations using Leadinfo, this vulnerability could lead to unauthorized modifications of lead data or disruption of lead tracking services, impacting sales and marketing operations. While confidentiality is not directly compromised, integrity and availability issues could undermine trust in the data and cause operational delays. Organizations relying heavily on Leadinfo for customer insights may experience degraded service quality or incorrect data analytics, affecting decision-making processes. Additionally, if attackers leverage this vulnerability to disrupt services, it could lead to financial losses and reputational damage. Given the remote and no-authentication exploitation vector, attackers could target multiple organizations indiscriminately, increasing the risk for European businesses using this software.
Mitigation Recommendations
Since no patches are currently available, European organizations should implement compensating controls immediately. These include restricting network access to the Leadinfo management interfaces via IP whitelisting or VPNs, enforcing strict internal access controls, and monitoring logs for unusual access patterns or unauthorized changes. Organizations should also consider temporarily disabling or limiting Leadinfo functionalities that require authorization until a patch is released. Regularly reviewing user permissions and conducting internal audits of access control configurations can help identify and remediate misconfigurations. Additionally, organizations should maintain up-to-date backups of Leadinfo data to enable recovery in case of integrity or availability compromise. Once a patch is released, prompt application is critical to fully mitigate the vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium, Sweden
CVE-2025-48271: CWE-862 Missing Authorization in Leadinfo Leadinfo
Description
Missing Authorization vulnerability in Leadinfo Leadinfo allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Leadinfo: from n/a through 1.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-48271 is a Missing Authorization vulnerability (CWE-862) identified in the Leadinfo product, affecting versions up to 1.1. This vulnerability arises due to incorrectly configured access control security levels, allowing unauthorized users to perform actions or access resources that should be restricted. The vulnerability is exploitable remotely (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it relatively easy to exploit. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component itself. The vulnerability does not impact confidentiality (C:N) but affects integrity (I:L) and availability (A:L), indicating that unauthorized modifications and disruptions to service are possible. Although no public exploits are currently known, the medium CVSS score of 6.5 reflects a significant risk that could lead to service degradation or unauthorized changes within the Leadinfo platform. Leadinfo is a lead generation and visitor identification tool used by businesses to track and analyze website visitors, which means exploitation could disrupt business operations or lead to unauthorized data manipulation within the platform.
Potential Impact
For European organizations using Leadinfo, this vulnerability could lead to unauthorized modifications of lead data or disruption of lead tracking services, impacting sales and marketing operations. While confidentiality is not directly compromised, integrity and availability issues could undermine trust in the data and cause operational delays. Organizations relying heavily on Leadinfo for customer insights may experience degraded service quality or incorrect data analytics, affecting decision-making processes. Additionally, if attackers leverage this vulnerability to disrupt services, it could lead to financial losses and reputational damage. Given the remote and no-authentication exploitation vector, attackers could target multiple organizations indiscriminately, increasing the risk for European businesses using this software.
Mitigation Recommendations
Since no patches are currently available, European organizations should implement compensating controls immediately. These include restricting network access to the Leadinfo management interfaces via IP whitelisting or VPNs, enforcing strict internal access controls, and monitoring logs for unusual access patterns or unauthorized changes. Organizations should also consider temporarily disabling or limiting Leadinfo functionalities that require authorization until a patch is released. Regularly reviewing user permissions and conducting internal audits of access control configurations can help identify and remediate misconfigurations. Additionally, organizations should maintain up-to-date backups of Leadinfo data to enable recovery in case of integrity or availability compromise. Once a patch is released, prompt application is critical to fully mitigate the vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-19T14:13:24.501Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68306f8e0acd01a249272479
Added to database: 5/23/2025, 12:52:30 PM
Last enriched: 7/8/2025, 8:24:42 PM
Last updated: 1/7/2026, 8:52:25 AM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.