Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64062: n/a

0
High
VulnerabilityCVE-2025-64062cvecve-2025-64062
Published: Tue Nov 25 2025 (11/25/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

The Primakon Pi Portal 1.0.18 /api/V2/pp_users?email endpoint is used for user data filtering but lacks proper server-side validation against the authenticated session. By manipulating the email parameter to an arbitrary value (e.g., otheruser@user.com), an attacker can assume the session and gain full access to the target user's data and privileges. Also, if the email parameter is left blank, the application defaults to the first user in the list, who is typically the application administrator, resulting in an immediate Privilege Escalation to the highest level.

AI-Powered Analysis

AILast updated: 12/02/2025, 18:45:31 UTC

Technical Analysis

CVE-2025-64062 is a critical authentication and authorization bypass vulnerability found in Primakon Pi Portal version 1.0.18, specifically in the /api/V2/pp_users?email REST API endpoint. This endpoint is designed to filter user data based on the email parameter but lacks proper server-side validation to ensure that the email parameter corresponds to the authenticated user's session. An attacker can exploit this by manipulating the email parameter to an arbitrary value, such as another user's email address, effectively assuming that user's session and gaining full access to their data and privileges. More critically, if the email parameter is omitted or left blank, the application defaults to returning data for the first user in the system's user list, who is typically the application administrator. This results in an immediate privilege escalation, granting the attacker the highest level of access without needing to authenticate as the administrator. The vulnerability is classified under CWE-285 (Improper Authorization) and has a CVSS v3.1 base score of 8.8, indicating high severity. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and only requires privileges of a normal user (PR:L) without user interaction (UI:N). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H) because the attacker can fully compromise user data and administrative functions. No patches or mitigations are currently listed, and no known exploits have been reported in the wild as of the publication date. This vulnerability poses a significant risk to any organization using the affected version of Primakon Pi Portal, especially where sensitive or critical data and administrative controls are involved.

Potential Impact

For European organizations, the impact of CVE-2025-64062 is substantial. Unauthorized access to user accounts can lead to data breaches involving personal, financial, or operational information, violating GDPR and other data protection regulations. The ability to escalate privileges to an administrator level without proper authentication can result in full system compromise, including unauthorized configuration changes, data manipulation, and potential disruption of services. This can affect business continuity, damage reputation, and incur regulatory penalties. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on Primakon Pi Portal for user management or administrative tasks are particularly vulnerable. The lack of user interaction and low complexity of exploitation increase the likelihood of successful attacks, potentially enabling lateral movement within networks. Additionally, the default fallback to the administrator account when the email parameter is blank presents a severe risk of immediate full system takeover. This vulnerability could be leveraged in targeted attacks or automated scanning campaigns, increasing exposure for European entities using this software.

Mitigation Recommendations

To mitigate CVE-2025-64062, organizations should implement strict server-side validation to ensure that the email parameter in the /api/V2/pp_users endpoint matches the authenticated user's session identity. The application logic must reject any requests where the email parameter does not correspond to the session or is missing. Specifically, the system should never default to the first user or any privileged account when the email parameter is blank or invalid. Access control checks must be enforced at the API level to prevent unauthorized data access and privilege escalation. Organizations should audit their current deployments of Primakon Pi Portal to identify affected versions and restrict access to the vulnerable API endpoint through network segmentation or firewall rules until a patch is available. Monitoring and logging of API requests for unusual email parameter values or access patterns can help detect exploitation attempts. Where possible, multi-factor authentication should be enforced for administrative accounts to reduce the risk of compromise. Finally, organizations should engage with the vendor or community to obtain patches or updates addressing this vulnerability and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6925f3dfea01c5f8b8301218

Added to database: 11/25/2025, 6:22:23 PM

Last enriched: 12/2/2025, 6:45:31 PM

Last updated: 12/4/2025, 8:30:17 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats