Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66132: Authorization Bypass Through User-Controlled Key in FAPI Business s.r.o. FAPI Member

0
Medium
VulnerabilityCVE-2025-66132cvecve-2025-66132
Published: Tue Dec 16 2025 (12/16/2025, 08:12:54 UTC)
Source: CVE Database V5
Vendor/Project: FAPI Business s.r.o.
Product: FAPI Member

Description

Authorization Bypass Through User-Controlled Key vulnerability in FAPI Business s.r.o. FAPI Member fapi-member allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects FAPI Member: from n/a through <= 2.2.26.

AI-Powered Analysis

AILast updated: 01/21/2026, 00:34:29 UTC

Technical Analysis

CVE-2025-66132 is a medium-severity authorization bypass vulnerability identified in FAPI Business s.r.o.'s FAPI Member software, a membership and client management platform widely used by small and medium enterprises. The vulnerability stems from incorrectly configured access control security levels that allow an attacker to manipulate a user-controlled key parameter to bypass authorization mechanisms. This means that an unauthenticated attacker can potentially gain unauthorized access to restricted resources or perform actions beyond their privileges without needing any user interaction. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N) indicates that the attack can be executed remotely over the network with low attack complexity, no privileges or user interaction required, and impacts confidentiality and integrity but not availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk because it undermines the fundamental access control model of the application. The affected versions include all releases up to and including 2.2.26. The root cause is the failure to properly validate or restrict the user-controlled key used in access control decisions, leading to an authorization bypass. This vulnerability could allow attackers to view or modify sensitive membership data, client information, or other protected resources managed by FAPI Member. Since FAPI Member is used primarily in European markets for membership management, the exposure is geographically relevant. The lack of available patches at the time of disclosure necessitates immediate configuration reviews and compensating controls to mitigate risk.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure and modification of sensitive membership or client data, potentially violating data protection regulations such as GDPR. The confidentiality and integrity of business-critical information managed by FAPI Member could be compromised, leading to reputational damage, financial loss, and regulatory penalties. Since the vulnerability requires no authentication or user interaction, it increases the risk of automated exploitation attempts from external attackers. Organizations relying on FAPI Member for managing memberships, subscriptions, or client relationships may face disruptions in trust and service integrity. The medium severity rating reflects the moderate but tangible risk to data confidentiality and integrity without direct impact on system availability. However, the ease of exploitation and the critical nature of the data involved make this a significant concern for European SMEs and enterprises using this software.

Mitigation Recommendations

Organizations should immediately audit their FAPI Member access control configurations to ensure that user-controlled keys are properly validated and cannot be manipulated to bypass authorization. Implement strict input validation and sanitization on all parameters influencing access control decisions. Monitor application logs for unusual access patterns or attempts to use unexpected key values. Restrict network access to the FAPI Member application to trusted IP ranges where feasible. Engage with FAPI Business s.r.o. to obtain and apply security patches or updates addressing this vulnerability as soon as they become available. Consider deploying web application firewalls (WAFs) with custom rules to detect and block attempts to exploit this authorization bypass. Additionally, review and reinforce internal policies around membership data access and perform regular security assessments to detect potential weaknesses. Finally, ensure incident response plans are updated to handle potential exploitation scenarios involving unauthorized data access.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-11-21T11:21:32.203Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69411752594e45819d70cb65

Added to database: 12/16/2025, 8:24:50 AM

Last enriched: 1/21/2026, 12:34:29 AM

Last updated: 2/7/2026, 12:53:08 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats