Skip to main content

CVE-2025-51533: n/a

Medium
VulnerabilityCVE-2025-51533cvecve-2025-51533
Published: Thu Aug 07 2025 (08/07/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An Insecure Direct Object Reference (IDOR) in Sage DPW v2024_12_004 and below allows unauthorized attackers to access internal forms via sending a crafted GET request.

AI-Powered Analysis

AILast updated: 08/07/2025, 18:47:43 UTC

Technical Analysis

CVE-2025-51533 is a security vulnerability classified as an Insecure Direct Object Reference (IDOR) found in Sage DPW version 2024.12.003. IDOR vulnerabilities occur when an application exposes internal implementation objects such as files, database records, or keys directly to users without proper authorization checks. In this case, unauthorized attackers can exploit the vulnerability by sending a specially crafted GET request to access internal forms that should otherwise be restricted. This unauthorized access does not require any authentication or user interaction, making exploitation relatively straightforward. The vulnerability affects the confidentiality of data by allowing attackers to view sensitive internal forms, but it does not impact data integrity or availability. The vendor has addressed this issue in the Halbjahresversion 2024_12_004 update. The CVSS v3.1 base score is 5.3, indicating a medium severity level, with the vector string CVSS:3.1/AC:L/AV:N/A:N/C:L/I:N/PR:N/S:U/UI:N, which means the attack complexity is low, the attack vector is network-based, no privileges or user interaction are required, and the impact is limited to a low confidentiality loss without affecting integrity or availability. There are no known exploits in the wild at the time of publication, and no specific CWE identifiers were assigned. The vulnerability was reserved in June 2025 and published in August 2025.

Potential Impact

For European organizations using Sage DPW 2024.12.003, this vulnerability poses a risk of unauthorized disclosure of internal forms, which may contain sensitive business or personal information. Such exposure could lead to information leakage, potentially aiding further targeted attacks or causing compliance issues under regulations like GDPR if personal data is involved. Although the vulnerability does not allow modification or destruction of data, the confidentiality breach alone can damage organizational reputation and trust. The ease of exploitation without authentication increases the risk, especially for organizations with externally accessible Sage DPW instances. However, since there are no known exploits in the wild and the issue is fixed in a subsequent version, the immediate risk is moderate. Organizations that delay patching remain vulnerable to opportunistic attackers scanning for this weakness.

Mitigation Recommendations

European organizations should promptly upgrade Sage DPW to the Halbjahresversion 2024_12_004 or later, which contains the fix for this IDOR vulnerability. Until the patch is applied, organizations should restrict external access to the affected Sage DPW instance using network-level controls such as firewalls or VPNs to limit exposure. Implementing strict access control policies and monitoring HTTP requests for unusual GET requests targeting internal forms can help detect exploitation attempts. Additionally, conducting a thorough audit of exposed internal forms and reviewing logs for unauthorized access patterns is recommended. Organizations should also ensure that their incident response plans include procedures for handling data exposure incidents related to this vulnerability. Finally, raising user awareness about the importance of timely patching and maintaining up-to-date software versions is critical to reducing risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6894f14cad5a09ad00fb9865

Added to database: 8/7/2025, 6:32:44 PM

Last enriched: 8/7/2025, 6:47:43 PM

Last updated: 8/8/2025, 9:12:59 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats