CVE-2025-64067: n/a
CVE-2025-64067 is a medium severity vulnerability affecting Primakon Pi Portal 1. 0. 18 API endpoints. The flaw arises from insufficient server-side authorization validation, allowing attackers to manipulate ID parameters or omit filters to access unauthorized user or project data. Exploitation does not require authentication or user interaction and can lead to unauthorized disclosure of sensitive personal and organizational information. Although no known exploits are currently in the wild, the vulnerability poses a significant privacy risk. European organizations using this software should prioritize mitigation to prevent data exposure. The vulnerability is rated with a CVSS score of 5. 3, reflecting its moderate impact primarily on confidentiality. Mitigation involves implementing strict server-side authorization checks and validating all input parameters.
AI Analysis
Technical Summary
CVE-2025-64067 identifies a security vulnerability in Primakon Pi Portal version 1.0.18, specifically in its API endpoints responsible for retrieving object-specific or filtered data such as user profiles and project records. The core issue is the lack of sufficient server-side validation to verify that the requesting user is authorized to access the requested resource. This results in two primary exploitation methods: first, direct ID manipulation or Insecure Direct Object Reference (IDOR), where an attacker alters an ID parameter (e.g., user_id or project_id) in the API request to access data belonging to other users; second, filter omission, where the attacker omits filtering parameters entirely, causing the API to return an unfiltered dataset containing all stored records across users. This vulnerability falls under CWE-639, which relates to authorization bypass through improper validation. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network with low attack complexity. The CVSS 3.1 base score is 5.3, indicating a medium severity primarily due to confidentiality impact without affecting integrity or availability. No patches or known exploits have been reported yet. The vulnerability exposes sensitive personal and organizational data, potentially leading to privacy violations, compliance issues, and reputational damage for affected organizations.
Potential Impact
For European organizations, the unauthorized exposure of sensitive personal and organizational data can have significant consequences. This includes violations of the EU General Data Protection Regulation (GDPR), which mandates strict controls over personal data access and disclosure. Data leakage could lead to regulatory fines, legal liabilities, and loss of customer trust. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on Primakon Pi Portal for managing sensitive data are particularly at risk. The vulnerability could facilitate insider threats or external attackers gaining access to confidential information, potentially enabling further attacks such as social engineering or targeted phishing. Although the vulnerability does not impact system integrity or availability, the confidentiality breach alone can disrupt business operations and damage organizational reputation. Given the ease of exploitation without authentication, attackers can remotely access data, increasing the threat surface for European entities using this software.
Mitigation Recommendations
Organizations should immediately implement strict server-side authorization checks to ensure that API requests are validated against the requesting user's permissions before returning any data. This includes verifying that the user is authorized to access the specific object identified by any ID parameters and enforcing filtering parameters to prevent unfiltered data retrieval. Input validation should be enhanced to reject requests with manipulated or missing filter parameters. Conduct a thorough code review of all API endpoints handling sensitive data to identify and remediate similar authorization flaws. Employ logging and monitoring to detect unusual access patterns or large data retrievals indicative of exploitation attempts. If possible, restrict API access to trusted networks or authenticated users until patches or fixes are available. Engage with the vendor for official patches or updates and apply them promptly once released. Additionally, conduct regular security assessments and penetration testing focused on API authorization controls to prevent recurrence.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-64067: n/a
Description
CVE-2025-64067 is a medium severity vulnerability affecting Primakon Pi Portal 1. 0. 18 API endpoints. The flaw arises from insufficient server-side authorization validation, allowing attackers to manipulate ID parameters or omit filters to access unauthorized user or project data. Exploitation does not require authentication or user interaction and can lead to unauthorized disclosure of sensitive personal and organizational information. Although no known exploits are currently in the wild, the vulnerability poses a significant privacy risk. European organizations using this software should prioritize mitigation to prevent data exposure. The vulnerability is rated with a CVSS score of 5. 3, reflecting its moderate impact primarily on confidentiality. Mitigation involves implementing strict server-side authorization checks and validating all input parameters.
AI-Powered Analysis
Technical Analysis
CVE-2025-64067 identifies a security vulnerability in Primakon Pi Portal version 1.0.18, specifically in its API endpoints responsible for retrieving object-specific or filtered data such as user profiles and project records. The core issue is the lack of sufficient server-side validation to verify that the requesting user is authorized to access the requested resource. This results in two primary exploitation methods: first, direct ID manipulation or Insecure Direct Object Reference (IDOR), where an attacker alters an ID parameter (e.g., user_id or project_id) in the API request to access data belonging to other users; second, filter omission, where the attacker omits filtering parameters entirely, causing the API to return an unfiltered dataset containing all stored records across users. This vulnerability falls under CWE-639, which relates to authorization bypass through improper validation. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network with low attack complexity. The CVSS 3.1 base score is 5.3, indicating a medium severity primarily due to confidentiality impact without affecting integrity or availability. No patches or known exploits have been reported yet. The vulnerability exposes sensitive personal and organizational data, potentially leading to privacy violations, compliance issues, and reputational damage for affected organizations.
Potential Impact
For European organizations, the unauthorized exposure of sensitive personal and organizational data can have significant consequences. This includes violations of the EU General Data Protection Regulation (GDPR), which mandates strict controls over personal data access and disclosure. Data leakage could lead to regulatory fines, legal liabilities, and loss of customer trust. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on Primakon Pi Portal for managing sensitive data are particularly at risk. The vulnerability could facilitate insider threats or external attackers gaining access to confidential information, potentially enabling further attacks such as social engineering or targeted phishing. Although the vulnerability does not impact system integrity or availability, the confidentiality breach alone can disrupt business operations and damage organizational reputation. Given the ease of exploitation without authentication, attackers can remotely access data, increasing the threat surface for European entities using this software.
Mitigation Recommendations
Organizations should immediately implement strict server-side authorization checks to ensure that API requests are validated against the requesting user's permissions before returning any data. This includes verifying that the user is authorized to access the specific object identified by any ID parameters and enforcing filtering parameters to prevent unfiltered data retrieval. Input validation should be enhanced to reject requests with manipulated or missing filter parameters. Conduct a thorough code review of all API endpoints handling sensitive data to identify and remediate similar authorization flaws. Employ logging and monitoring to detect unusual access patterns or large data retrievals indicative of exploitation attempts. If possible, restrict API access to trusted networks or authenticated users until patches or fixes are available. Engage with the vendor for official patches or updates and apply them promptly once released. Additionally, conduct regular security assessments and penetration testing focused on API authorization controls to prevent recurrence.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-10-27T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6925faccea01c5f8b8382a85
Added to database: 11/25/2025, 6:51:56 PM
Last enriched: 12/2/2025, 8:06:01 PM
Last updated: 1/10/2026, 10:11:58 PM
Views: 70
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.