Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64248: Missing Authorization in emarket-design Request a Quote

0
Medium
VulnerabilityCVE-2025-64248cvecve-2025-64248
Published: Tue Dec 16 2025 (12/16/2025, 08:12:49 UTC)
Source: CVE Database V5
Vendor/Project: emarket-design
Product: Request a Quote

Description

Missing Authorization vulnerability in emarket-design Request a Quote request-a-quote allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Request a Quote: from n/a through <= 2.5.3.

AI-Powered Analysis

AILast updated: 01/20/2026, 23:50:50 UTC

Technical Analysis

CVE-2025-64248 identifies a missing authorization vulnerability in the 'Request a Quote' feature of the emarket-design product, affecting versions up to and including 2.5.3. This vulnerability arises from incorrectly configured access control security levels, allowing users with low privileges (PR:L) to perform actions that should be restricted. The vulnerability does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N). The scope is unchanged (S:U), meaning the impact is confined to the vulnerable component without affecting other system components. The CVSS score of 4.3 reflects a medium severity, primarily due to the impact on integrity (I:L) without affecting confidentiality or availability. The flaw could allow unauthorized users to submit or modify quote requests, potentially leading to business process disruption or fraudulent quote submissions. No patches or known exploits are currently documented, indicating that vendors or users should prioritize patch development and deployment. The vulnerability is particularly relevant for organizations relying on emarket-design's Request a Quote module for customer interactions and sales processes, especially in e-commerce environments.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized manipulation of quote requests, undermining the integrity of sales and procurement workflows. While it does not expose sensitive data or cause service outages, the ability to submit or alter quotes without proper authorization could result in financial discrepancies, reputational damage, and potential compliance issues, especially under regulations like GDPR if personal data is indirectly affected. Organizations in sectors with high reliance on automated quotation systems, such as manufacturing, retail, and wholesale, may experience operational disruptions. The medium severity suggests that while the threat is not critical, it could be exploited by insiders or low-privilege attackers to gain unfair advantages or disrupt business processes. The absence of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation.

Mitigation Recommendations

Organizations should immediately review and strengthen access control configurations within the emarket-design Request a Quote module, ensuring that authorization checks are correctly implemented for all user roles. Applying principle of least privilege to user accounts interacting with this feature is essential. Monitoring logs for unusual quote request activities can help detect exploitation attempts. Since no official patches are currently available, consider implementing temporary compensating controls such as web application firewalls (WAF) with custom rules to restrict unauthorized access patterns. Engage with the vendor for timely patch releases and apply updates as soon as they become available. Conduct security testing and code reviews focused on access control mechanisms in the affected component. Additionally, educate staff on the risks of unauthorized access and enforce strict user management policies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-29T03:08:17.827Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6941174d594e45819d70c3ff

Added to database: 12/16/2025, 8:24:45 AM

Last enriched: 1/20/2026, 11:50:50 PM

Last updated: 2/4/2026, 9:07:54 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats