Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63248: n/a

0
High
VulnerabilityCVE-2025-63248cvecve-2025-63248
Published: Wed Nov 05 2025 (11/05/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

DWSurvey 6.14.0 is vulnerable to Incorrect Access Control. When deleting a questionnaire, replacing the questionnaire ID with the ID of another questionnaire can enable the deletion of other questionnaires.

AI-Powered Analysis

AILast updated: 11/05/2025, 16:34:29 UTC

Technical Analysis

CVE-2025-63248 identifies an Incorrect Access Control vulnerability in DWSurvey version 6.14.0, a survey management software. The vulnerability arises when the deletion functionality fails to properly verify that the user requesting deletion owns or is authorized to delete the specified questionnaire. Specifically, by substituting the questionnaire ID parameter in the deletion request with the ID of another questionnaire, an attacker can delete questionnaires that they should not have access to. This type of vulnerability stems from insufficient authorization checks on server-side operations, allowing privilege escalation in the context of resource management. The vulnerability does not require authentication or complex user interaction, making it easier to exploit if the deletion endpoint is accessible. Although no CVSS score has been assigned and no known exploits are reported in the wild, the flaw could be leveraged to cause unauthorized data deletion, leading to loss of critical survey data, disruption of research or business processes, and potential compliance issues if data retention policies are violated. The lack of patch information suggests that remediation may still be pending or that users need to implement compensating controls. Organizations relying on DWSurvey for data collection, especially those handling sensitive or regulated data, should prioritize addressing this vulnerability to maintain data integrity and availability.

Potential Impact

For European organizations, the impact of CVE-2025-63248 can be significant, particularly for entities relying on DWSurvey for research, customer feedback, or regulatory compliance data collection. Unauthorized deletion of questionnaires can result in loss of valuable data, disruption of ongoing surveys, and delays in decision-making processes. This can further lead to reputational damage if data loss affects customer trust or regulatory reporting. In sectors such as healthcare, finance, or public administration, where survey data may be critical for compliance or operational decisions, the impact is heightened. Additionally, the vulnerability could be exploited to sabotage data integrity or availability, potentially causing operational downtime. Given the GDPR and other European data protection regulations, improper handling or loss of personal data through such vulnerabilities could also lead to legal and financial penalties. The absence of authentication requirements for exploitation increases the risk surface, making it easier for attackers to cause harm without insider access.

Mitigation Recommendations

To mitigate CVE-2025-63248, organizations should implement strict server-side authorization checks ensuring that only users with proper permissions can delete questionnaires. This includes validating that the questionnaire ID in deletion requests belongs to the authenticated user or their authorized scope. Employing role-based access control (RBAC) or attribute-based access control (ABAC) mechanisms can help enforce these restrictions. Logging and monitoring deletion requests for unusual patterns, such as deletion of multiple questionnaires in a short time frame or deletion requests from unexpected IP addresses, can aid in early detection of exploitation attempts. If patches or updates from the vendor become available, they should be applied promptly. In the absence of official patches, organizations can consider implementing web application firewalls (WAFs) with custom rules to block suspicious manipulation of questionnaire IDs. Additionally, restricting access to the deletion API endpoint to trusted networks or VPNs can reduce exposure. Regular security audits and penetration testing focused on access control mechanisms are recommended to identify similar flaws.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690b7c74ffac907e5be8d902

Added to database: 11/5/2025, 4:33:56 PM

Last enriched: 11/5/2025, 4:34:29 PM

Last updated: 11/6/2025, 10:30:49 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats