CVE-2025-66132: Authorization Bypass Through User-Controlled Key in FAPI Business s.r.o. FAPI Member
Authorization Bypass Through User-Controlled Key vulnerability in FAPI Business s.r.o. FAPI Member fapi-member allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects FAPI Member: from n/a through <= 2.2.26.
AI Analysis
Technical Summary
CVE-2025-66132 is a medium-severity authorization bypass vulnerability identified in FAPI Business s.r.o.'s FAPI Member software, a membership and client management platform widely used by small and medium enterprises. The vulnerability stems from incorrectly configured access control security levels that allow an attacker to manipulate a user-controlled key parameter to bypass authorization mechanisms. This means that an unauthenticated attacker can potentially gain unauthorized access to restricted resources or perform actions beyond their privileges without needing any user interaction. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N) indicates that the attack can be executed remotely over the network with low attack complexity, no privileges or user interaction required, and impacts confidentiality and integrity but not availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk because it undermines the fundamental access control model of the application. The affected versions include all releases up to and including 2.2.26. The root cause is the failure to properly validate or restrict the user-controlled key used in access control decisions, leading to an authorization bypass. This vulnerability could allow attackers to view or modify sensitive membership data, client information, or other protected resources managed by FAPI Member. Since FAPI Member is used primarily in European markets for membership management, the exposure is geographically relevant. The lack of available patches at the time of disclosure necessitates immediate configuration reviews and compensating controls to mitigate risk.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure and modification of sensitive membership or client data, potentially violating data protection regulations such as GDPR. The confidentiality and integrity of business-critical information managed by FAPI Member could be compromised, leading to reputational damage, financial loss, and regulatory penalties. Since the vulnerability requires no authentication or user interaction, it increases the risk of automated exploitation attempts from external attackers. Organizations relying on FAPI Member for managing memberships, subscriptions, or client relationships may face disruptions in trust and service integrity. The medium severity rating reflects the moderate but tangible risk to data confidentiality and integrity without direct impact on system availability. However, the ease of exploitation and the critical nature of the data involved make this a significant concern for European SMEs and enterprises using this software.
Mitigation Recommendations
Organizations should immediately audit their FAPI Member access control configurations to ensure that user-controlled keys are properly validated and cannot be manipulated to bypass authorization. Implement strict input validation and sanitization on all parameters influencing access control decisions. Monitor application logs for unusual access patterns or attempts to use unexpected key values. Restrict network access to the FAPI Member application to trusted IP ranges where feasible. Engage with FAPI Business s.r.o. to obtain and apply security patches or updates addressing this vulnerability as soon as they become available. Consider deploying web application firewalls (WAFs) with custom rules to detect and block attempts to exploit this authorization bypass. Additionally, review and reinforce internal policies around membership data access and perform regular security assessments to detect potential weaknesses. Finally, ensure incident response plans are updated to handle potential exploitation scenarios involving unauthorized data access.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-66132: Authorization Bypass Through User-Controlled Key in FAPI Business s.r.o. FAPI Member
Description
Authorization Bypass Through User-Controlled Key vulnerability in FAPI Business s.r.o. FAPI Member fapi-member allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects FAPI Member: from n/a through <= 2.2.26.
AI-Powered Analysis
Technical Analysis
CVE-2025-66132 is a medium-severity authorization bypass vulnerability identified in FAPI Business s.r.o.'s FAPI Member software, a membership and client management platform widely used by small and medium enterprises. The vulnerability stems from incorrectly configured access control security levels that allow an attacker to manipulate a user-controlled key parameter to bypass authorization mechanisms. This means that an unauthenticated attacker can potentially gain unauthorized access to restricted resources or perform actions beyond their privileges without needing any user interaction. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N) indicates that the attack can be executed remotely over the network with low attack complexity, no privileges or user interaction required, and impacts confidentiality and integrity but not availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk because it undermines the fundamental access control model of the application. The affected versions include all releases up to and including 2.2.26. The root cause is the failure to properly validate or restrict the user-controlled key used in access control decisions, leading to an authorization bypass. This vulnerability could allow attackers to view or modify sensitive membership data, client information, or other protected resources managed by FAPI Member. Since FAPI Member is used primarily in European markets for membership management, the exposure is geographically relevant. The lack of available patches at the time of disclosure necessitates immediate configuration reviews and compensating controls to mitigate risk.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure and modification of sensitive membership or client data, potentially violating data protection regulations such as GDPR. The confidentiality and integrity of business-critical information managed by FAPI Member could be compromised, leading to reputational damage, financial loss, and regulatory penalties. Since the vulnerability requires no authentication or user interaction, it increases the risk of automated exploitation attempts from external attackers. Organizations relying on FAPI Member for managing memberships, subscriptions, or client relationships may face disruptions in trust and service integrity. The medium severity rating reflects the moderate but tangible risk to data confidentiality and integrity without direct impact on system availability. However, the ease of exploitation and the critical nature of the data involved make this a significant concern for European SMEs and enterprises using this software.
Mitigation Recommendations
Organizations should immediately audit their FAPI Member access control configurations to ensure that user-controlled keys are properly validated and cannot be manipulated to bypass authorization. Implement strict input validation and sanitization on all parameters influencing access control decisions. Monitor application logs for unusual access patterns or attempts to use unexpected key values. Restrict network access to the FAPI Member application to trusted IP ranges where feasible. Engage with FAPI Business s.r.o. to obtain and apply security patches or updates addressing this vulnerability as soon as they become available. Consider deploying web application firewalls (WAFs) with custom rules to detect and block attempts to exploit this authorization bypass. Additionally, review and reinforce internal policies around membership data access and perform regular security assessments to detect potential weaknesses. Finally, ensure incident response plans are updated to handle potential exploitation scenarios involving unauthorized data access.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-11-21T11:21:32.203Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69411752594e45819d70cb65
Added to database: 12/16/2025, 8:24:50 AM
Last enriched: 1/21/2026, 12:34:29 AM
Last updated: 2/7/2026, 12:20:39 PM
Views: 48
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.