CVE-2025-63248: n/a
DWSurvey 6.14.0 is vulnerable to Incorrect Access Control. When deleting a questionnaire, replacing the questionnaire ID with the ID of another questionnaire can enable the deletion of other questionnaires.
AI Analysis
Technical Summary
CVE-2025-63248 is an Incorrect Access Control vulnerability identified in DWSurvey version 6.14.0. The flaw arises when the application fails to properly verify the ownership or authorization of a questionnaire before processing a delete request. Specifically, when a user attempts to delete a questionnaire, the system accepts a questionnaire ID parameter. By replacing this ID with that of another questionnaire, an attacker can delete questionnaires they do not own or have permission to modify. This vulnerability is classified under CWE-639 (Authorization Bypass Through User-Controlled Key). The attack vector is network-based, requiring no authentication or user interaction, making it highly accessible for remote exploitation. The CVSS 3.1 base score is 7.5, reflecting a high severity due to the ease of exploitation and the impact on data integrity. Although confidentiality and availability are not directly affected, the unauthorized deletion of questionnaires compromises the integrity of survey data, potentially disrupting business processes relying on accurate survey results. No patches or mitigations have been officially released at the time of publication, and no known exploits have been observed in the wild. Organizations using DWSurvey should urgently assess their exposure and implement compensating controls.
Potential Impact
The primary impact of CVE-2025-63248 is on data integrity, as unauthorized deletion of questionnaires can lead to loss of critical survey data. For European organizations, this can disrupt decision-making processes, compliance reporting, and customer feedback mechanisms that rely on survey data. In sectors such as market research, healthcare, public administration, and education, where surveys are integral, this could result in operational setbacks and reputational damage. Although the vulnerability does not compromise confidentiality or availability, the ability to manipulate or erase data without authorization undermines trust in the system and may lead to regulatory scrutiny under data governance laws like GDPR if data loss affects personal data processing. The lack of required authentication and user interaction increases the risk of widespread exploitation, especially in environments where DWSurvey is exposed to the internet or insufficiently segmented networks.
Mitigation Recommendations
1. Immediately implement strict server-side authorization checks to verify that the user requesting questionnaire deletion owns or is authorized to delete the specified questionnaire ID. 2. Employ parameter validation and enforce access control policies that bind questionnaire IDs to user sessions or roles. 3. Monitor and log all deletion requests with detailed metadata to detect anomalous or unauthorized deletion patterns. 4. Restrict network exposure of DWSurvey management interfaces to trusted internal networks or VPNs to reduce attack surface. 5. If possible, disable questionnaire deletion functionality temporarily until a vendor patch is available. 6. Engage with the DWSurvey vendor or community to obtain or request a security patch addressing this vulnerability. 7. Conduct regular security audits and penetration tests focusing on access control mechanisms within the application. 8. Educate administrators and users about the risks of unauthorized data manipulation and encourage prompt reporting of suspicious activity.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-63248: n/a
Description
DWSurvey 6.14.0 is vulnerable to Incorrect Access Control. When deleting a questionnaire, replacing the questionnaire ID with the ID of another questionnaire can enable the deletion of other questionnaires.
AI-Powered Analysis
Technical Analysis
CVE-2025-63248 is an Incorrect Access Control vulnerability identified in DWSurvey version 6.14.0. The flaw arises when the application fails to properly verify the ownership or authorization of a questionnaire before processing a delete request. Specifically, when a user attempts to delete a questionnaire, the system accepts a questionnaire ID parameter. By replacing this ID with that of another questionnaire, an attacker can delete questionnaires they do not own or have permission to modify. This vulnerability is classified under CWE-639 (Authorization Bypass Through User-Controlled Key). The attack vector is network-based, requiring no authentication or user interaction, making it highly accessible for remote exploitation. The CVSS 3.1 base score is 7.5, reflecting a high severity due to the ease of exploitation and the impact on data integrity. Although confidentiality and availability are not directly affected, the unauthorized deletion of questionnaires compromises the integrity of survey data, potentially disrupting business processes relying on accurate survey results. No patches or mitigations have been officially released at the time of publication, and no known exploits have been observed in the wild. Organizations using DWSurvey should urgently assess their exposure and implement compensating controls.
Potential Impact
The primary impact of CVE-2025-63248 is on data integrity, as unauthorized deletion of questionnaires can lead to loss of critical survey data. For European organizations, this can disrupt decision-making processes, compliance reporting, and customer feedback mechanisms that rely on survey data. In sectors such as market research, healthcare, public administration, and education, where surveys are integral, this could result in operational setbacks and reputational damage. Although the vulnerability does not compromise confidentiality or availability, the ability to manipulate or erase data without authorization undermines trust in the system and may lead to regulatory scrutiny under data governance laws like GDPR if data loss affects personal data processing. The lack of required authentication and user interaction increases the risk of widespread exploitation, especially in environments where DWSurvey is exposed to the internet or insufficiently segmented networks.
Mitigation Recommendations
1. Immediately implement strict server-side authorization checks to verify that the user requesting questionnaire deletion owns or is authorized to delete the specified questionnaire ID. 2. Employ parameter validation and enforce access control policies that bind questionnaire IDs to user sessions or roles. 3. Monitor and log all deletion requests with detailed metadata to detect anomalous or unauthorized deletion patterns. 4. Restrict network exposure of DWSurvey management interfaces to trusted internal networks or VPNs to reduce attack surface. 5. If possible, disable questionnaire deletion functionality temporarily until a vendor patch is available. 6. Engage with the DWSurvey vendor or community to obtain or request a security patch addressing this vulnerability. 7. Conduct regular security audits and penetration tests focusing on access control mechanisms within the application. 8. Educate administrators and users about the risks of unauthorized data manipulation and encourage prompt reporting of suspicious activity.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-10-27T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 690b7c74ffac907e5be8d902
Added to database: 11/5/2025, 4:33:56 PM
Last enriched: 11/12/2025, 5:14:49 PM
Last updated: 12/20/2025, 2:20:21 PM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7782: CWE-862 Missing Authorization in WP JobHunt
HighCVE-2025-7733: CWE-639 Authorization Bypass Through User-Controlled Key in WP JobHunt
MediumCVE-2025-14298: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in damian-gora FiboSearch – Ajax Search for WooCommerce
MediumCVE-2025-12492: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
MediumCVE-2025-13619: CWE-269 Improper Privilege Management in CMSSuperHeroes Flex Store Users
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.