Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66086: Missing Authorization in Cozy Vision SMS Alert Order Notifications

0
Medium
VulnerabilityCVE-2025-66086cvecve-2025-66086
Published: Fri Nov 21 2025 (11/21/2025, 12:29:58 UTC)
Source: CVE Database V5
Vendor/Project: Cozy Vision
Product: SMS Alert Order Notifications

Description

Missing Authorization vulnerability in Cozy Vision SMS Alert Order Notifications sms-alert allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SMS Alert Order Notifications: from n/a through <= 3.8.8.

AI-Powered Analysis

AILast updated: 01/21/2026, 00:24:00 UTC

Technical Analysis

CVE-2025-66086 identifies a Missing Authorization vulnerability in Cozy Vision's SMS Alert Order Notifications product, specifically in versions up to 3.8.8. The vulnerability stems from incorrectly configured access control security levels, which fail to properly restrict access to SMS alert order notifications. This misconfiguration allows remote attackers to access sensitive notification data without requiring any privileges or user interaction. The CVSS v3.1 base score is 5.3, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and limited confidentiality impact (C:L) with no integrity or availability impact (I:N/A:N). The vulnerability does not require authentication, making it easier to exploit remotely. However, it only leaks limited confidential information related to SMS alert orders rather than allowing full system compromise or data manipulation. There are no known public exploits or patches available at the time of publication, which suggests organizations should proactively assess and secure affected systems. The vulnerability primarily threatens confidentiality by exposing order notification data, which could be leveraged for further social engineering or operational disruption. Cozy Vision's SMS Alert Order Notifications are typically used in environments where SMS alerts are critical for order tracking and customer communication, making confidentiality breaches potentially impactful. The lack of patches necessitates immediate mitigation through access control reviews and network segmentation to limit exposure.

Potential Impact

For European organizations, the primary impact of CVE-2025-66086 is the unauthorized disclosure of SMS alert order notification data. This could lead to leakage of sensitive operational information, customer order details, or business process insights, which may be exploited for fraud, social engineering, or competitive intelligence. Sectors such as retail, logistics, and telecommunications that rely heavily on SMS alerting for order management are particularly at risk. Although the vulnerability does not affect system integrity or availability, the confidentiality breach could undermine customer trust and regulatory compliance, especially under GDPR requirements for protecting personal data. The ease of remote exploitation without authentication increases the risk of widespread unauthorized access if the product is exposed to untrusted networks. However, the absence of known exploits and the medium severity score indicate that while the threat is real, it is not currently critical. Organizations that have integrated Cozy Vision SMS Alert Order Notifications into their operational workflows should prioritize assessment and mitigation to prevent potential data leaks and reputational damage.

Mitigation Recommendations

1. Immediately review and tighten access control configurations on all Cozy Vision SMS Alert Order Notifications deployments to ensure proper authorization checks are enforced. 2. Restrict network access to the SMS Alert Order Notifications service by implementing firewall rules or network segmentation, limiting exposure to trusted internal networks only. 3. Monitor logs and network traffic for unusual or unauthorized access attempts to the SMS alert notification endpoints. 4. Engage with Cozy Vision or authorized vendors to obtain patches or updates addressing this vulnerability as they become available. 5. Implement multi-factor authentication and role-based access controls where possible to add layers of security around sensitive notification data. 6. Conduct regular security audits and penetration testing focusing on access control mechanisms within the SMS alerting infrastructure. 7. Educate operational and security teams about the risks of missing authorization vulnerabilities and the importance of strict access controls. 8. Consider alternative secure notification mechanisms if immediate patching or mitigation is not feasible. These steps go beyond generic advice by focusing on network-level restrictions, proactive monitoring, and vendor engagement specific to this product and vulnerability context.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-11-21T11:21:04.794Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69205c30c36be036e6ff273c

Added to database: 11/21/2025, 12:33:52 PM

Last enriched: 1/21/2026, 12:24:00 AM

Last updated: 2/7/2026, 8:58:17 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats