Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70148: n/a

0
High
VulnerabilityCVE-2025-70148cvecve-2025-70148
Published: Wed Feb 18 2026 (02/18/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Missing authentication and authorization in print_membership_card.php in CodeAstro Membership Management System 1.0 allows unauthenticated attackers to access membership card data of arbitrary users via direct requests with a manipulated id parameter, resulting in insecure direct object reference (IDOR).

AI-Powered Analysis

AILast updated: 02/19/2026, 12:09:49 UTC

Technical Analysis

CVE-2025-70148 is an insecure direct object reference (IDOR) vulnerability found in the print_membership_card.php script of CodeAstro Membership Management System version 1.0. The core issue is the absence of authentication and authorization checks when processing requests to this script. Attackers can exploit this by sending crafted HTTP requests with manipulated 'id' parameters to retrieve membership card data belonging to any user without needing to authenticate. This flaw directly exposes sensitive personal information stored in membership cards, which may include names, membership numbers, and potentially other personal identifiers. The vulnerability is remotely exploitable over the network without any user interaction or privileges, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The CVSS score of 7.5 reflects a high severity primarily due to the complete confidentiality breach risk. No patches or fixes are currently listed, and no known exploits have been reported in the wild, but the vulnerability’s simplicity and impact make it a likely target for attackers once weaponized. The lack of authorization controls violates secure coding best practices and regulatory requirements for data protection, especially under GDPR in Europe. Organizations using CodeAstro Membership Management System should urgently assess exposure and implement compensating controls.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of personal data managed within membership systems. Unauthorized access to membership card data can lead to privacy violations, identity theft, and reputational damage. Given the strict data protection regulations in Europe, such as GDPR, exposure of personal data can result in substantial fines and legal consequences. Membership-based organizations, including clubs, associations, and service providers, may suffer loss of trust from their members. The vulnerability could also be leveraged as a foothold for further attacks if membership data is linked to other internal systems. The ease of exploitation without authentication increases the attack surface, making widespread data leakage possible if the system is internet-facing. This risk is amplified in sectors with high membership volumes or sensitive member information, such as healthcare, education, or financial services.

Mitigation Recommendations

To mitigate CVE-2025-70148, organizations should immediately implement strict authentication and authorization checks on the print_membership_card.php endpoint to ensure only authorized users can access their own membership data. Input validation should be enforced to prevent manipulation of the 'id' parameter. If possible, apply access control mechanisms such as session validation, role-based access control (RBAC), or attribute-based access control (ABAC) to restrict data access. Conduct a thorough code review and penetration test to identify similar IDOR vulnerabilities elsewhere in the application. If a patch from the vendor becomes available, apply it promptly. As a temporary measure, restrict external access to the vulnerable endpoint via network controls or web application firewalls (WAFs) with rules to detect and block suspicious parameter tampering. Additionally, monitor logs for unusual access patterns to detect exploitation attempts. Educate developers on secure coding practices to prevent future IDOR issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6996fb4b8fb9188dea8c0de6

Added to database: 2/19/2026, 12:00:11 PM

Last enriched: 2/19/2026, 12:09:49 PM

Last updated: 2/21/2026, 12:17:39 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats