Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69752: n/a

0
Medium
VulnerabilityCVE-2025-69752cvecve-2025-69752
Published: Thu Feb 12 2026 (02/12/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in the "My Details" user profile functionality of Ideagen Q-Pulse 7.1.0.32 allows an authenticated user to view other users' profile information by modifying the objectKey HTTP parameter in the My Details page URL.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/19/2026, 17:52:54 UTC

Technical Analysis

CVE-2025-69752 is a security vulnerability identified in Ideagen Q-Pulse version 7.1.0.32, specifically within the 'My Details' user profile functionality. The flaw allows an authenticated user to bypass authorization controls by modifying the 'objectKey' HTTP parameter in the URL of the My Details page. This parameter is intended to reference the user's own profile data, but due to insufficient validation or access control checks, it can be altered to access other users' profile information. This vulnerability falls under CWE-639, which involves authorization bypass through user-controlled keys or identifiers. The vulnerability does not require user interaction beyond authentication, and the attack vector is network-based (remote). The CVSS v3.1 base score is 4.3, indicating medium severity, with a vector string of AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N, meaning the attack is remotely exploitable with low complexity, requires low privileges (authenticated user), no user interaction, unchanged scope, and impacts confidentiality only. No patches or fixes have been published yet, and no known exploits are reported in the wild. The vulnerability exposes sensitive user profile information, which could include personally identifiable information or other confidential data stored in the Q-Pulse system.

Potential Impact

The primary impact of CVE-2025-69752 is the unauthorized disclosure of user profile information within Ideagen Q-Pulse environments. This can lead to privacy violations, potential social engineering attacks, and insider threat exploitation. Although the vulnerability does not affect system integrity or availability, the confidentiality breach could undermine trust in the system and expose sensitive organizational or personal data. For organizations using Q-Pulse, especially those handling regulated or sensitive information, this could result in compliance issues and reputational damage. Since exploitation requires authenticated access, the threat is mainly from insider users or compromised accounts. The lack of known exploits reduces immediate risk, but the vulnerability remains a concern until mitigated or patched.

Mitigation Recommendations

To mitigate CVE-2025-69752, organizations should implement strict access control policies and monitor user activities within Ideagen Q-Pulse. Specifically, restrict user permissions to the minimum necessary to reduce the number of users with profile access. Employ network segmentation and multi-factor authentication to reduce the risk of account compromise. Monitor logs for unusual URL parameter modifications or access patterns indicative of attempts to exploit the objectKey parameter. If possible, disable or restrict access to the 'My Details' page until a vendor patch is available. Engage with Ideagen support to obtain timelines for a security update or workaround. Additionally, conduct user awareness training to highlight the risks of insider threats and encourage reporting of suspicious behavior. Finally, consider implementing web application firewalls (WAFs) with custom rules to detect and block unauthorized parameter tampering.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698dfd94c9e1ff5ad8ec1801

Added to database: 2/12/2026, 4:19:32 PM

Last enriched: 2/19/2026, 5:52:54 PM

Last updated: 3/29/2026, 11:21:55 PM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses