Skip to main content

CVE-2025-48271: CWE-862 Missing Authorization in Leadinfo Leadinfo

Medium
VulnerabilityCVE-2025-48271cvecve-2025-48271cwe-862
Published: Fri May 23 2025 (05/23/2025, 12:43:16 UTC)
Source: CVE
Vendor/Project: Leadinfo
Product: Leadinfo

Description

Missing Authorization vulnerability in Leadinfo Leadinfo allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Leadinfo: from n/a through 1.1.

AI-Powered Analysis

AILast updated: 07/08/2025, 20:24:42 UTC

Technical Analysis

CVE-2025-48271 is a Missing Authorization vulnerability (CWE-862) identified in the Leadinfo product, affecting versions up to 1.1. This vulnerability arises due to incorrectly configured access control security levels, allowing unauthorized users to perform actions or access resources that should be restricted. The vulnerability is exploitable remotely (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it relatively easy to exploit. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component itself. The vulnerability does not impact confidentiality (C:N) but affects integrity (I:L) and availability (A:L), indicating that unauthorized modifications and disruptions to service are possible. Although no public exploits are currently known, the medium CVSS score of 6.5 reflects a significant risk that could lead to service degradation or unauthorized changes within the Leadinfo platform. Leadinfo is a lead generation and visitor identification tool used by businesses to track and analyze website visitors, which means exploitation could disrupt business operations or lead to unauthorized data manipulation within the platform.

Potential Impact

For European organizations using Leadinfo, this vulnerability could lead to unauthorized modifications of lead data or disruption of lead tracking services, impacting sales and marketing operations. While confidentiality is not directly compromised, integrity and availability issues could undermine trust in the data and cause operational delays. Organizations relying heavily on Leadinfo for customer insights may experience degraded service quality or incorrect data analytics, affecting decision-making processes. Additionally, if attackers leverage this vulnerability to disrupt services, it could lead to financial losses and reputational damage. Given the remote and no-authentication exploitation vector, attackers could target multiple organizations indiscriminately, increasing the risk for European businesses using this software.

Mitigation Recommendations

Since no patches are currently available, European organizations should implement compensating controls immediately. These include restricting network access to the Leadinfo management interfaces via IP whitelisting or VPNs, enforcing strict internal access controls, and monitoring logs for unusual access patterns or unauthorized changes. Organizations should also consider temporarily disabling or limiting Leadinfo functionalities that require authorization until a patch is released. Regularly reviewing user permissions and conducting internal audits of access control configurations can help identify and remediate misconfigurations. Additionally, organizations should maintain up-to-date backups of Leadinfo data to enable recovery in case of integrity or availability compromise. Once a patch is released, prompt application is critical to fully mitigate the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-19T14:13:24.501Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68306f8e0acd01a249272479

Added to database: 5/23/2025, 12:52:30 PM

Last enriched: 7/8/2025, 8:24:42 PM

Last updated: 7/30/2025, 4:09:17 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats