Skip to main content

CVE-2025-53288: CWE-862 Missing Authorization in Adrian Ladó PlatiOnline Payments

Medium
VulnerabilityCVE-2025-53288cvecve-2025-53288cwe-862
Published: Fri Jun 27 2025 (06/27/2025, 13:21:23 UTC)
Source: CVE Database V5
Vendor/Project: Adrian Ladó
Product: PlatiOnline Payments

Description

Missing Authorization vulnerability in Adrian Ladó PlatiOnline Payments allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects PlatiOnline Payments: from n/a through 6.3.2.

AI-Powered Analysis

AILast updated: 06/27/2025, 14:25:35 UTC

Technical Analysis

CVE-2025-53288 is a Missing Authorization vulnerability (CWE-862) identified in the Adrian Ladó PlatiOnline Payments software, affecting versions up to 6.3.2. This vulnerability arises from incorrectly configured access control security levels, allowing users with limited privileges (requiring at least low-level privileges) to perform unauthorized actions that should be restricted. The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N), with low attack complexity (AC:L). While it does not impact confidentiality or availability, it can lead to integrity violations, such as unauthorized modification or manipulation of payment data or transaction parameters. The CVSS v3.1 base score is 4.3, indicating a medium severity level. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability's root cause is a failure to enforce proper authorization checks, which is critical in payment processing systems where unauthorized actions can lead to financial discrepancies or fraud. Given the nature of payment platforms, even integrity issues can have significant operational and reputational consequences.

Potential Impact

For European organizations using PlatiOnline Payments, this vulnerability poses a risk of unauthorized transaction manipulation or alteration of payment-related data. Although it does not directly expose sensitive data (no confidentiality impact), the integrity compromise can lead to financial losses, incorrect billing, or fraudulent transactions. This can undermine customer trust and lead to regulatory scrutiny under GDPR and financial compliance frameworks such as PSD2. Payment service providers and e-commerce platforms relying on this software may face operational disruptions or reputational damage if attackers exploit this vulnerability. The medium severity score suggests that while the risk is not critical, it should not be ignored, especially given the financial context and potential cascading effects on business processes.

Mitigation Recommendations

Organizations should immediately review and audit access control configurations within PlatiOnline Payments to ensure that authorization checks are correctly implemented and enforced for all sensitive operations. Restrict user privileges strictly on a need-to-access basis and monitor for any anomalous activities indicating unauthorized access attempts. Since no patches are currently available, consider implementing compensating controls such as network segmentation to limit access to the payment system, enhanced logging and alerting on privilege escalations or unusual transactions, and manual transaction reviews for suspicious activities. Engage with the vendor for timely updates and patches. Additionally, conduct penetration testing focused on authorization mechanisms to identify and remediate similar weaknesses proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-27T11:58:53.299Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 685ea033f6cf9081996a79b2

Added to database: 6/27/2025, 1:44:19 PM

Last enriched: 6/27/2025, 2:25:35 PM

Last updated: 8/4/2025, 4:23:16 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats