Skip to main content

CVE-2025-49241: CWE-862 Missing Authorization in bobbingwide oik

Medium
VulnerabilityCVE-2025-49241cvecve-2025-49241cwe-862
Published: Fri Jun 06 2025 (06/06/2025, 12:53:34 UTC)
Source: CVE Database V5
Vendor/Project: bobbingwide
Product: oik

Description

Missing Authorization vulnerability in bobbingwide oik allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects oik: from n/a through 4.15.1.

AI-Powered Analysis

AILast updated: 07/08/2025, 00:24:57 UTC

Technical Analysis

CVE-2025-49241 is a security vulnerability classified under CWE-862, which refers to Missing Authorization. This vulnerability affects the 'oik' product developed by bobbingwide, specifically versions up to 4.15.1. The core issue is that the software does not properly enforce access control security levels, allowing unauthorized users to exploit functionality or access resources that should be restricted. The vulnerability is network exploitable (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it remotely exploitable by any attacker without authentication. The impact is limited to confidentiality loss (C:L), with no impact on integrity or availability. This means that an attacker could potentially access sensitive information or data that should be protected but cannot modify or disrupt the system. The CVSS v3.1 base score is 5.3, indicating a medium severity level. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on June 6, 2025, and was reserved just two days prior. The lack of patches suggests that organizations using the affected versions of oik should be vigilant and consider mitigation strategies until an official fix is available.

Potential Impact

For European organizations using the bobbingwide oik product, this vulnerability poses a moderate risk primarily to confidentiality. Unauthorized access could lead to exposure of sensitive business or customer data, potentially violating GDPR and other data protection regulations. While the vulnerability does not allow modification or disruption of services, the leakage of confidential information could damage reputation, lead to regulatory fines, and undermine customer trust. Organizations in sectors handling sensitive personal data, such as finance, healthcare, and government, are particularly at risk. The fact that exploitation requires no authentication and no user interaction increases the risk of automated or opportunistic attacks. However, the absence of known exploits in the wild and the medium severity rating suggest that immediate catastrophic impact is unlikely but should not be ignored.

Mitigation Recommendations

1. Immediate mitigation should include restricting network access to the oik application, especially from untrusted or public networks, using firewalls or network segmentation. 2. Implement strict monitoring and logging of access to the oik system to detect any unauthorized access attempts. 3. Review and harden access control configurations within the application, if possible, to ensure that authorization checks are enforced correctly. 4. Engage with bobbingwide for updates or patches and apply them promptly once available. 5. Conduct a thorough audit of data accessible via the oik product to identify and protect sensitive information. 6. Consider deploying Web Application Firewalls (WAFs) with custom rules to block suspicious requests targeting authorization bypass attempts. 7. Educate relevant IT and security staff about this vulnerability to ensure rapid response to any suspicious activity. These steps go beyond generic advice by focusing on network-level controls, monitoring, and proactive configuration review tailored to the specifics of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-04T09:40:52.585Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6842eddf71f4d251b5c880b9

Added to database: 6/6/2025, 1:32:15 PM

Last enriched: 7/8/2025, 12:24:57 AM

Last updated: 8/8/2025, 9:36:29 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats