CVE-2025-57971: CWE-862 Missing Authorization in SALESmanago SALESmanago & Leadoo
Missing Authorization vulnerability in SALESmanago SALESmanago & Leadoo allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SALESmanago & Leadoo: from n/a through 3.8.1.
AI Analysis
Technical Summary
CVE-2025-57971 is a security vulnerability classified under CWE-862, which pertains to Missing Authorization. This vulnerability affects the SALESmanago & Leadoo platforms, specifically versions up to 3.8.1. The core issue arises from incorrectly configured access control security levels, allowing unauthorized users to perform actions or access resources that should be restricted. The vulnerability does not require authentication (PR:N) or user interaction (UI:N) and can be exploited remotely over the network (AV:N). The CVSS v3.1 base score is 5.3, indicating a medium severity level. The impact primarily affects the integrity of the system, as unauthorized modifications or actions could be performed, but confidentiality and availability are not directly impacted. The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component and does not extend to other components. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in August 2025 and published in September 2025, indicating it is a recent discovery. SALESmanago & Leadoo are marketing automation and customer engagement platforms widely used for managing customer data and interactions, making the integrity of their access controls critical to prevent unauthorized manipulation of marketing campaigns, customer segmentation, or data.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the integrity of marketing and customer engagement operations. Unauthorized access could lead to manipulation of customer data, alteration of marketing campaigns, or unauthorized changes to segmentation rules, potentially resulting in reputational damage, loss of customer trust, and regulatory compliance issues under GDPR due to improper handling of personal data. While confidentiality is not directly impacted, the integrity breach could indirectly expose sensitive business strategies or customer targeting information. The lack of required authentication and user interaction increases the risk of automated exploitation attempts. Organizations relying heavily on SALESmanago & Leadoo for customer engagement could face operational disruptions and potential financial losses if attackers exploit this vulnerability to sabotage marketing efforts or inject malicious configurations.
Mitigation Recommendations
European organizations should immediately audit their current SALESmanago & Leadoo deployments to identify affected versions (up to 3.8.1). Until an official patch is released, organizations should implement strict network-level access controls to restrict access to the SALESmanago & Leadoo management interfaces, limiting them to trusted IP addresses and VPNs. Monitoring and logging of all access attempts should be enhanced to detect unusual or unauthorized activities promptly. Organizations should also review and tighten role-based access controls within the platform to minimize the risk of privilege escalation. Engaging with SALESmanago support for early patch availability or workarounds is recommended. Additionally, organizations should conduct internal penetration testing focusing on access control mechanisms to identify and remediate any other potential authorization weaknesses. Finally, staff training on recognizing suspicious activity related to marketing platforms can help in early detection of exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-57971: CWE-862 Missing Authorization in SALESmanago SALESmanago & Leadoo
Description
Missing Authorization vulnerability in SALESmanago SALESmanago & Leadoo allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SALESmanago & Leadoo: from n/a through 3.8.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-57971 is a security vulnerability classified under CWE-862, which pertains to Missing Authorization. This vulnerability affects the SALESmanago & Leadoo platforms, specifically versions up to 3.8.1. The core issue arises from incorrectly configured access control security levels, allowing unauthorized users to perform actions or access resources that should be restricted. The vulnerability does not require authentication (PR:N) or user interaction (UI:N) and can be exploited remotely over the network (AV:N). The CVSS v3.1 base score is 5.3, indicating a medium severity level. The impact primarily affects the integrity of the system, as unauthorized modifications or actions could be performed, but confidentiality and availability are not directly impacted. The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component and does not extend to other components. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in August 2025 and published in September 2025, indicating it is a recent discovery. SALESmanago & Leadoo are marketing automation and customer engagement platforms widely used for managing customer data and interactions, making the integrity of their access controls critical to prevent unauthorized manipulation of marketing campaigns, customer segmentation, or data.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the integrity of marketing and customer engagement operations. Unauthorized access could lead to manipulation of customer data, alteration of marketing campaigns, or unauthorized changes to segmentation rules, potentially resulting in reputational damage, loss of customer trust, and regulatory compliance issues under GDPR due to improper handling of personal data. While confidentiality is not directly impacted, the integrity breach could indirectly expose sensitive business strategies or customer targeting information. The lack of required authentication and user interaction increases the risk of automated exploitation attempts. Organizations relying heavily on SALESmanago & Leadoo for customer engagement could face operational disruptions and potential financial losses if attackers exploit this vulnerability to sabotage marketing efforts or inject malicious configurations.
Mitigation Recommendations
European organizations should immediately audit their current SALESmanago & Leadoo deployments to identify affected versions (up to 3.8.1). Until an official patch is released, organizations should implement strict network-level access controls to restrict access to the SALESmanago & Leadoo management interfaces, limiting them to trusted IP addresses and VPNs. Monitoring and logging of all access attempts should be enhanced to detect unusual or unauthorized activities promptly. Organizations should also review and tighten role-based access controls within the platform to minimize the risk of privilege escalation. Engaging with SALESmanago support for early patch availability or workarounds is recommended. Additionally, organizations should conduct internal penetration testing focusing on access control mechanisms to identify and remediate any other potential authorization weaknesses. Finally, staff training on recognizing suspicious activity related to marketing platforms can help in early detection of exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-08-22T11:37:02.930Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e0920411971642e85b877e
Added to database: 10/4/2025, 3:18:28 AM
Last enriched: 10/4/2025, 3:34:11 AM
Last updated: 11/18/2025, 8:39:22 AM
Views: 53
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9625: CWE-352 Cross-Site Request Forgery (CSRF) in interledger Coil Web Monetization
MediumCVE-2025-8609: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in rometheme RTMKit
MediumCVE-2025-8605: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codeyatri Gutenify – Visual Site Builder Blocks & Site Templates.
MediumCVE-2025-13088: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in ikhodal Category and Product Woocommerce Tabs
HighCVE-2025-12962: CWE-918 Server-Side Request Forgery (SSRF) in willbontrager Local Syndication
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.