Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65647: n/a

0
Medium
VulnerabilityCVE-2025-65647cvecve-2025-65647
Published: Tue Nov 25 2025 (11/25/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-65647 is an Insecure Direct Object Reference (IDOR) vulnerability in the Track order function of PHPGURUKUL Online Shopping Portal 2. 1. It allows an attacker with limited privileges to disclose information by manipulating the 'oid' parameter without requiring user interaction. The vulnerability has a medium severity with a CVSS score of 4. 3, impacting confidentiality but not integrity or availability. No known exploits are currently reported in the wild. European organizations using this specific e-commerce platform could be at risk of unauthorized data exposure. Mitigation involves implementing proper access control checks on the 'oid' parameter and validating user permissions before disclosing order information. Countries with higher e-commerce adoption and usage of PHPGURUKUL products, such as Germany, France, and the UK, are more likely to be affected. Given the medium severity and limited scope, organizations should prioritize patching and access control improvements to prevent potential data leaks.

AI-Powered Analysis

AILast updated: 12/02/2025, 20:06:50 UTC

Technical Analysis

CVE-2025-65647 identifies an Insecure Direct Object Reference (IDOR) vulnerability in the Track order function of the PHPGURUKUL Online Shopping Portal version 2.1. IDOR vulnerabilities occur when an application exposes internal implementation objects, such as database keys or file names, without proper authorization checks. In this case, the 'oid' parameter, presumably representing an order identifier, can be manipulated by an attacker to access information related to other orders. The vulnerability allows information disclosure, impacting confidentiality, but does not affect data integrity or system availability. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) indicates that the attack can be performed remotely over the network with low attack complexity, requires low privileges (authenticated user), and no user interaction. The vulnerability is classified under CWE-639, which relates to authorization bypass through improper access control on object references. No patches or known exploits are currently available, suggesting this is a newly published vulnerability. The lack of affected version details implies the need for organizations to verify their use of PHPGURUKUL Online Shopping Portal 2.1 or related versions. The vulnerability's exploitation could lead to unauthorized disclosure of order information, potentially exposing customer data and order details.

Potential Impact

For European organizations using PHPGURUKUL Online Shopping Portal 2.1, this vulnerability could lead to unauthorized disclosure of customer order information, violating data privacy regulations such as GDPR. Exposure of order details may include personally identifiable information (PII), order contents, and transaction history, which could be leveraged for fraud, social engineering, or reputational damage. Although the vulnerability does not allow modification or deletion of data, the confidentiality breach alone can have significant compliance and trust implications. The medium severity reflects limited impact scope but notable risk due to ease of exploitation by authenticated users. Retailers and e-commerce businesses in Europe relying on this platform are particularly at risk, especially those handling large volumes of customer data. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks. Organizations failing to address this vulnerability may face regulatory penalties and loss of customer confidence.

Mitigation Recommendations

1. Implement strict access control checks on the 'oid' parameter to ensure users can only access their own order information. 2. Enforce server-side authorization validation before returning any order-related data. 3. Conduct code reviews and penetration testing focusing on IDOR vulnerabilities in all object reference parameters. 4. If possible, apply patches or updates from PHPGURUKUL once available; in the meantime, consider temporary workarounds such as session-based order tracking. 5. Log and monitor access to order tracking endpoints to detect unusual access patterns or attempts to enumerate order IDs. 6. Educate developers on secure coding practices related to object references and authorization. 7. Review and update privacy policies and incident response plans to address potential data disclosure incidents. 8. Restrict API or web interface access to authenticated and authorized users only, minimizing exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69260888ffc41f183f790645

Added to database: 11/25/2025, 7:50:32 PM

Last enriched: 12/2/2025, 8:06:50 PM

Last updated: 1/10/2026, 10:11:57 PM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats