Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69311: Missing Authorization in Broadstreet Broadstreet Ads

0
High
VulnerabilityCVE-2025-69311cvecve-2025-69311
Published: Thu Jan 22 2026 (01/22/2026, 16:52:31 UTC)
Source: CVE Database V5
Vendor/Project: Broadstreet
Product: Broadstreet Ads

Description

Missing Authorization vulnerability in Broadstreet Broadstreet Ads broadstreet allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Broadstreet Ads: from n/a through <= 1.52.1.

AI-Powered Analysis

AILast updated: 01/30/2026, 09:17:47 UTC

Technical Analysis

CVE-2025-69311 identifies a missing authorization vulnerability in Broadstreet Ads, a digital advertising platform used to manage and deliver ads. The flaw stems from incorrectly configured access control security levels, allowing attackers with low privileges (PR:L) to access or manipulate resources without proper authorization. The vulnerability affects all versions up to and including 1.52.1. The CVSS 3.1 base score is 7.6, reflecting a high severity due to the network attack vector (AV:N), low attack complexity (AC:L), and no user interaction (UI:N) required. The impact on confidentiality is high (C:H), indicating potential unauthorized data disclosure, while integrity (I:L) and availability (A:L) impacts are lower but still present. Exploitation could lead to unauthorized access to sensitive advertising data or manipulation of ad content, potentially disrupting ad delivery or leaking confidential client information. No patches or known exploits have been reported yet, but the vulnerability's nature suggests that attackers could leverage it to gain unauthorized insights or cause partial service degradation. The issue was reserved at the end of 2025 and published in early 2026, indicating recent discovery and disclosure.

Potential Impact

For European organizations, especially those in digital media, marketing, and advertising sectors relying on Broadstreet Ads, this vulnerability poses significant risks. Unauthorized access could lead to exposure of sensitive advertising campaign data, client information, and potentially user data collected through ads, impacting confidentiality. Integrity compromise, though limited, could allow attackers to alter ad content, damaging brand reputation and causing financial losses. Availability impact could disrupt ad delivery, affecting revenue streams. Given the network-based attack vector and low privilege requirement, attackers could exploit this vulnerability remotely without user interaction, increasing the risk of widespread exploitation. The lack of known exploits currently provides a window for mitigation, but the high severity score demands prompt action. European organizations are also subject to GDPR, so data breaches resulting from this vulnerability could lead to regulatory penalties and reputational damage.

Mitigation Recommendations

Organizations should immediately audit and tighten access control configurations within Broadstreet Ads, ensuring that authorization checks are correctly implemented and enforced for all user roles and API endpoints. Network segmentation should be applied to restrict access to the Broadstreet Ads management interfaces to trusted internal networks or VPNs. Implement robust monitoring and logging of access attempts to detect anomalous or unauthorized activities early. Employ the principle of least privilege for all users and service accounts interacting with Broadstreet Ads. Since no official patches are available yet, consider temporary compensating controls such as IP whitelisting and multi-factor authentication for administrative access. Stay informed about vendor updates and apply patches promptly once released. Conduct security awareness training for staff managing the platform to recognize and respond to potential exploitation attempts. Finally, review incident response plans to prepare for potential exploitation scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-31T20:12:02.743Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697259294623b1157c7fb2c4

Added to database: 1/22/2026, 5:06:49 PM

Last enriched: 1/30/2026, 9:17:47 AM

Last updated: 2/6/2026, 1:50:24 PM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats