Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64067: n/a

0
Medium
VulnerabilityCVE-2025-64067cvecve-2025-64067
Published: Tue Nov 25 2025 (11/25/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-64067 is a medium severity vulnerability affecting Primakon Pi Portal 1. 0. 18 API endpoints. The flaw arises from insufficient server-side authorization validation, allowing attackers to manipulate ID parameters or omit filters to access unauthorized user or project data. Exploitation does not require authentication or user interaction and can lead to unauthorized disclosure of sensitive personal and organizational information. Although no known exploits are currently in the wild, the vulnerability poses a significant privacy risk. European organizations using this software should prioritize mitigation to prevent data exposure. The vulnerability is rated with a CVSS score of 5. 3, reflecting its moderate impact primarily on confidentiality. Mitigation involves implementing strict server-side authorization checks and validating all input parameters.

AI-Powered Analysis

AILast updated: 12/02/2025, 20:06:01 UTC

Technical Analysis

CVE-2025-64067 identifies a security vulnerability in Primakon Pi Portal version 1.0.18, specifically in its API endpoints responsible for retrieving object-specific or filtered data such as user profiles and project records. The core issue is the lack of sufficient server-side validation to verify that the requesting user is authorized to access the requested resource. This results in two primary exploitation methods: first, direct ID manipulation or Insecure Direct Object Reference (IDOR), where an attacker alters an ID parameter (e.g., user_id or project_id) in the API request to access data belonging to other users; second, filter omission, where the attacker omits filtering parameters entirely, causing the API to return an unfiltered dataset containing all stored records across users. This vulnerability falls under CWE-639, which relates to authorization bypass through improper validation. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network with low attack complexity. The CVSS 3.1 base score is 5.3, indicating a medium severity primarily due to confidentiality impact without affecting integrity or availability. No patches or known exploits have been reported yet. The vulnerability exposes sensitive personal and organizational data, potentially leading to privacy violations, compliance issues, and reputational damage for affected organizations.

Potential Impact

For European organizations, the unauthorized exposure of sensitive personal and organizational data can have significant consequences. This includes violations of the EU General Data Protection Regulation (GDPR), which mandates strict controls over personal data access and disclosure. Data leakage could lead to regulatory fines, legal liabilities, and loss of customer trust. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on Primakon Pi Portal for managing sensitive data are particularly at risk. The vulnerability could facilitate insider threats or external attackers gaining access to confidential information, potentially enabling further attacks such as social engineering or targeted phishing. Although the vulnerability does not impact system integrity or availability, the confidentiality breach alone can disrupt business operations and damage organizational reputation. Given the ease of exploitation without authentication, attackers can remotely access data, increasing the threat surface for European entities using this software.

Mitigation Recommendations

Organizations should immediately implement strict server-side authorization checks to ensure that API requests are validated against the requesting user's permissions before returning any data. This includes verifying that the user is authorized to access the specific object identified by any ID parameters and enforcing filtering parameters to prevent unfiltered data retrieval. Input validation should be enhanced to reject requests with manipulated or missing filter parameters. Conduct a thorough code review of all API endpoints handling sensitive data to identify and remediate similar authorization flaws. Employ logging and monitoring to detect unusual access patterns or large data retrievals indicative of exploitation attempts. If possible, restrict API access to trusted networks or authenticated users until patches or fixes are available. Engage with the vendor for official patches or updates and apply them promptly once released. Additionally, conduct regular security assessments and penetration testing focused on API authorization controls to prevent recurrence.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6925faccea01c5f8b8382a85

Added to database: 11/25/2025, 6:51:56 PM

Last enriched: 12/2/2025, 8:06:01 PM

Last updated: 1/10/2026, 10:11:58 PM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats