Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58402: CWE-639 Authorization Bypass Through User-Controlled Key in CGM CGM CLININET

0
High
VulnerabilityCVE-2025-58402cvecve-2025-58402cwe-639
Published: Mon Mar 02 2026 (03/02/2026, 11:16:31 UTC)
Source: CVE Database V5
Vendor/Project: CGM
Product: CGM CLININET

Description

The CGM CLININET application uses direct, sequential object identifiers "MessageID" without proper authorization checks. By modifying the parameter in the GET request, an attacker can access messages and attachments belonging to other users.

AI-Powered Analysis

AILast updated: 03/02/2026, 11:40:28 UTC

Technical Analysis

CVE-2025-58402 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the CGM CLININET healthcare application. The vulnerability arises because the application uses direct, sequential object identifiers (MessageID) in GET requests without enforcing proper authorization controls. Attackers can manipulate the MessageID parameter to sequentially access messages and attachments belonging to other users, bypassing intended access restrictions. The vulnerability does not require user interaction or elevated privileges beyond limited authenticated access, and it can be exploited remotely over the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) reflects that the attack vector is network-based with low complexity, no authentication required beyond limited privileges, no user interaction, and a high impact on confidentiality. The vulnerability compromises sensitive healthcare data confidentiality, potentially exposing private patient information and attachments. Although no patches or known exploits are currently available, the vulnerability's presence in a healthcare application handling sensitive data makes it critical to address. The root cause is the lack of proper authorization checks on user-controlled sequential identifiers, a common security design flaw leading to Insecure Direct Object References (IDOR).

Potential Impact

The primary impact of CVE-2025-58402 is the unauthorized disclosure of sensitive healthcare messages and attachments, severely compromising patient confidentiality and privacy. This can lead to violations of data protection regulations such as GDPR and HIPAA, resulting in legal and financial repercussions for affected organizations. The exposure of medical information can also damage patient trust and the reputation of healthcare providers. Since the vulnerability can be exploited remotely without user interaction and with minimal privileges, attackers can automate data harvesting attacks at scale. This increases the risk of large-scale data breaches affecting multiple patients. Additionally, the unauthorized access could be leveraged for further attacks such as social engineering or identity theft. The lack of known exploits in the wild currently reduces immediate risk, but the vulnerability's straightforward exploitation method means it could be weaponized quickly once discovered by malicious actors. Organizations worldwide using CGM CLININET in clinical environments face significant risks to data confidentiality and regulatory compliance.

Mitigation Recommendations

To mitigate CVE-2025-58402, organizations should implement the following specific measures: 1) Immediately audit and restrict access to the CGM CLININET application to trusted networks and users only, minimizing exposure. 2) Implement strict authorization checks on all object identifiers, ensuring that users can only access messages and attachments they are explicitly authorized to view. This may involve redesigning the application logic to avoid direct use of sequential IDs or employing indirect references (e.g., UUIDs or opaque tokens). 3) Monitor and analyze application logs for unusual access patterns, such as sequential MessageID requests or access attempts to other users' data. 4) If patches become available from CGM, apply them promptly. 5) Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious parameter tampering attempts targeting MessageID parameters. 6) Educate staff about the risks of data exposure and enforce strong authentication and session management practices to limit unauthorized access. 7) Conduct regular security assessments and penetration testing focused on authorization controls to detect similar flaws. These targeted actions go beyond generic advice by focusing on the specific vulnerability mechanism and the healthcare context.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2025-09-01T07:18:45.943Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a573fd32ffcdb8a20705ea

Added to database: 3/2/2026, 11:26:53 AM

Last enriched: 3/2/2026, 11:40:28 AM

Last updated: 3/2/2026, 11:11:45 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses