CVE-2025-62362: CWE-359: Exposure of Private Personal Information to an Unauthorized Actor in GPP-Woo GPP-burgerportaal
gpp-burgerportaal is a Dutch government citizen portal application. In versions before 2.0.3, 3.0.2, and 4.0.1, the name and email address of employees who publish content are exposed in network responses and can be discovered by viewing the browser's developer tools network tab. This information disclosure may violate employee privacy expectations and could be used for targeted attacks or unwanted contact. This issue has been patched in versions 2.0.3, 3.0.2, and 4.0.1. No known workarounds exist.
AI Analysis
Technical Summary
CVE-2025-62362 is a vulnerability classified under CWE-359 (Exposure of Private Personal Information to an Unauthorized Actor) found in the GPP-burgerportaal application, a citizen portal used by the Dutch government. The flaw exists in versions before 2.0.3, 3.0.2, and 4.0.1, where employee names and email addresses who publish content are inadvertently included in network responses. These responses can be inspected by anyone with access to the browser’s developer tools network tab, meaning no authentication or special privileges are required to obtain this information. The exposure of such personal information can violate privacy expectations and potentially enable attackers to conduct targeted phishing, spear-phishing, or social engineering attacks against employees. The vulnerability is remotely exploitable over the network without user interaction, making it relatively easy to exploit. Although no known exploits are currently in the wild, the risk remains significant due to the sensitivity of the data. The issue has been addressed in the patched versions 2.0.3, 3.0.2, and 4.0.1 of the application. No alternative mitigations or workarounds are available, so upgrading is the only effective remediation. The CVSS 4.0 base score of 6.9 reflects a medium severity, driven by the network attack vector, low complexity, no privileges or user interaction required, and limited confidentiality impact. Integrity and availability are not affected. The scope is limited to the GPP-burgerportaal application and its users.
Potential Impact
For European organizations, particularly government entities and contractors in the Netherlands using GPP-burgerportaal, this vulnerability poses a privacy risk by exposing employee personal information such as names and email addresses. This exposure can lead to targeted phishing or social engineering campaigns, increasing the risk of credential theft, unauthorized access, or further compromise. While the vulnerability does not directly impact system integrity or availability, the indirect consequences of successful social engineering attacks could be severe, including data breaches or disruption of government services. The reputational damage from privacy violations could also be significant, especially under GDPR regulations which mandate strict protection of personal data. Other European countries using similar government portals or related GPP-Woo products might face similar risks if they deploy affected versions. The lack of known exploits reduces immediate risk but does not eliminate the threat, as attackers could develop exploits based on publicly available information.
Mitigation Recommendations
The primary mitigation is to promptly upgrade all instances of GPP-burgerportaal to the patched versions 2.0.3, 3.0.2, or 4.0.1 depending on the version branch in use. Organizations should conduct an inventory of affected systems to ensure no outdated versions remain in production or staging environments. Implement strict access controls and monitoring on the portal to detect unusual access patterns or data scraping attempts. Educate employees about the potential for targeted phishing attacks leveraging exposed information and enforce strong email security measures such as DMARC, DKIM, and SPF. Consider deploying web application firewalls (WAFs) to monitor and block suspicious requests. Conduct regular privacy audits and penetration tests to verify that no sensitive information is exposed in network responses or logs. Since no workarounds exist, patching is critical. Finally, review and update incident response plans to address potential phishing or social engineering incidents stemming from this vulnerability.
Affected Countries
Netherlands, Belgium, Germany
CVE-2025-62362: CWE-359: Exposure of Private Personal Information to an Unauthorized Actor in GPP-Woo GPP-burgerportaal
Description
gpp-burgerportaal is a Dutch government citizen portal application. In versions before 2.0.3, 3.0.2, and 4.0.1, the name and email address of employees who publish content are exposed in network responses and can be discovered by viewing the browser's developer tools network tab. This information disclosure may violate employee privacy expectations and could be used for targeted attacks or unwanted contact. This issue has been patched in versions 2.0.3, 3.0.2, and 4.0.1. No known workarounds exist.
AI-Powered Analysis
Technical Analysis
CVE-2025-62362 is a vulnerability classified under CWE-359 (Exposure of Private Personal Information to an Unauthorized Actor) found in the GPP-burgerportaal application, a citizen portal used by the Dutch government. The flaw exists in versions before 2.0.3, 3.0.2, and 4.0.1, where employee names and email addresses who publish content are inadvertently included in network responses. These responses can be inspected by anyone with access to the browser’s developer tools network tab, meaning no authentication or special privileges are required to obtain this information. The exposure of such personal information can violate privacy expectations and potentially enable attackers to conduct targeted phishing, spear-phishing, or social engineering attacks against employees. The vulnerability is remotely exploitable over the network without user interaction, making it relatively easy to exploit. Although no known exploits are currently in the wild, the risk remains significant due to the sensitivity of the data. The issue has been addressed in the patched versions 2.0.3, 3.0.2, and 4.0.1 of the application. No alternative mitigations or workarounds are available, so upgrading is the only effective remediation. The CVSS 4.0 base score of 6.9 reflects a medium severity, driven by the network attack vector, low complexity, no privileges or user interaction required, and limited confidentiality impact. Integrity and availability are not affected. The scope is limited to the GPP-burgerportaal application and its users.
Potential Impact
For European organizations, particularly government entities and contractors in the Netherlands using GPP-burgerportaal, this vulnerability poses a privacy risk by exposing employee personal information such as names and email addresses. This exposure can lead to targeted phishing or social engineering campaigns, increasing the risk of credential theft, unauthorized access, or further compromise. While the vulnerability does not directly impact system integrity or availability, the indirect consequences of successful social engineering attacks could be severe, including data breaches or disruption of government services. The reputational damage from privacy violations could also be significant, especially under GDPR regulations which mandate strict protection of personal data. Other European countries using similar government portals or related GPP-Woo products might face similar risks if they deploy affected versions. The lack of known exploits reduces immediate risk but does not eliminate the threat, as attackers could develop exploits based on publicly available information.
Mitigation Recommendations
The primary mitigation is to promptly upgrade all instances of GPP-burgerportaal to the patched versions 2.0.3, 3.0.2, or 4.0.1 depending on the version branch in use. Organizations should conduct an inventory of affected systems to ensure no outdated versions remain in production or staging environments. Implement strict access controls and monitoring on the portal to detect unusual access patterns or data scraping attempts. Educate employees about the potential for targeted phishing attacks leveraging exposed information and enforce strong email security measures such as DMARC, DKIM, and SPF. Consider deploying web application firewalls (WAFs) to monitor and block suspicious requests. Conduct regular privacy audits and penetration tests to verify that no sensitive information is exposed in network responses or logs. Since no workarounds exist, patching is critical. Finally, review and update incident response plans to address potential phishing or social engineering incidents stemming from this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-10T14:22:48.202Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ed73a7efcc33289f4e04f8
Added to database: 10/13/2025, 9:48:23 PM
Last enriched: 10/21/2025, 12:39:21 AM
Last updated: 12/2/2025, 10:03:48 AM
Views: 69
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13871: CWE-352 Cross-Site Request Forgery (CSRF) in ObjectPlanet Opinio
LowCVE-2025-10971: CWE-922 Insecure Storage of Sensitive Information in FERMAX ELECTRÓNICA S.A.U MeetMe
HighCVE-2025-13696: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in softdiscover Zigaform – Price Calculator & Cost Estimation Form Builder Lite
MediumCVE-2025-11726: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
MediumCVE-2025-13685: CWE-352 Cross-Site Request Forgery (CSRF) in ays-pro Photo Gallery by Ays – Responsive Image Gallery
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.