CVE-2025-70614: n/a
OpenCode Systems OC Messaging / USSD Gateway OC Release 6.32.2 contains a broken access control vulnerability in the web-based control panel allowing authenticated low-privileged attackers to gain to access to arbitrary SMS messages via a crafted company or tenant identifier parameter.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-70614 resides in OpenCode Systems OC Messaging / USSD Gateway OC Release 6.32.2, specifically within its web-based control panel. It is classified as a broken access control issue (CWE-284), where the system fails to properly restrict access to SMS message data based on user privileges. Authenticated attackers with low-level permissions can exploit this flaw by crafting requests that manipulate the company or tenant identifier parameter, thereby bypassing intended access restrictions and retrieving arbitrary SMS messages belonging to other tenants or companies. The vulnerability has a CVSS v3.1 score of 8.1, indicating high severity, with an attack vector over the network (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality and integrity (C:H/I:H) but no impact on availability (A:N). This means the attacker only needs valid credentials but can then access sensitive message data that should be restricted. The vulnerability was reserved in January 2026 and published in March 2026. No patches or known exploits are currently listed, suggesting that mitigation efforts should be prioritized before exploitation becomes widespread. The flaw poses a significant risk to the confidentiality of SMS communications managed through this platform, potentially exposing sensitive or private information to unauthorized parties.
Potential Impact
The primary impact of CVE-2025-70614 is the unauthorized disclosure and potential manipulation of SMS messages within affected organizations. This can lead to severe confidentiality breaches, exposing sensitive communications, personal data, or business-critical information transmitted via SMS. Integrity is also compromised as attackers could potentially alter or misuse message data if the system allows it beyond read access. Although availability is not affected, the exposure of SMS content can facilitate further attacks such as social engineering, fraud, or espionage. Organizations relying on OpenCode Systems OC Messaging / USSD Gateway for critical communications, especially in sectors like telecommunications, finance, healthcare, and government, face heightened risks of data leakage and regulatory non-compliance. The vulnerability’s exploitation requires only low-privileged authenticated access, increasing the likelihood of insider threats or compromised accounts being leveraged. The absence of known exploits currently provides a window for proactive mitigation, but the high CVSS score underscores the urgency for remediation to prevent potential widespread abuse.
Mitigation Recommendations
To mitigate CVE-2025-70614 effectively, organizations should first verify if they are running OpenCode Systems OC Messaging / USSD Gateway OC Release 6.32.2 or similar vulnerable versions. Immediate steps include: 1) Restricting access to the web-based control panel to trusted administrators only, employing network segmentation and strong authentication mechanisms such as multi-factor authentication (MFA). 2) Implementing strict role-based access controls (RBAC) and validating that users cannot manipulate company or tenant identifiers beyond their authorized scope. 3) Monitoring and logging all access to SMS message data and reviewing logs for suspicious activity indicative of parameter tampering. 4) Engaging with OpenCode Systems for official patches or updates addressing this vulnerability and applying them promptly once available. 5) Conducting internal security assessments and penetration tests focusing on access control enforcement within the messaging platform. 6) Educating users about the risks of credential compromise and enforcing strong password policies to reduce the risk of low-privileged account misuse. These targeted measures go beyond generic advice by focusing on access control validation, monitoring, and administrative safeguards specific to the vulnerable component.
Affected Countries
United States, India, Germany, United Kingdom, France, Brazil, South Africa, Australia, Canada, Singapore
CVE-2025-70614: n/a
Description
OpenCode Systems OC Messaging / USSD Gateway OC Release 6.32.2 contains a broken access control vulnerability in the web-based control panel allowing authenticated low-privileged attackers to gain to access to arbitrary SMS messages via a crafted company or tenant identifier parameter.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2025-70614 resides in OpenCode Systems OC Messaging / USSD Gateway OC Release 6.32.2, specifically within its web-based control panel. It is classified as a broken access control issue (CWE-284), where the system fails to properly restrict access to SMS message data based on user privileges. Authenticated attackers with low-level permissions can exploit this flaw by crafting requests that manipulate the company or tenant identifier parameter, thereby bypassing intended access restrictions and retrieving arbitrary SMS messages belonging to other tenants or companies. The vulnerability has a CVSS v3.1 score of 8.1, indicating high severity, with an attack vector over the network (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality and integrity (C:H/I:H) but no impact on availability (A:N). This means the attacker only needs valid credentials but can then access sensitive message data that should be restricted. The vulnerability was reserved in January 2026 and published in March 2026. No patches or known exploits are currently listed, suggesting that mitigation efforts should be prioritized before exploitation becomes widespread. The flaw poses a significant risk to the confidentiality of SMS communications managed through this platform, potentially exposing sensitive or private information to unauthorized parties.
Potential Impact
The primary impact of CVE-2025-70614 is the unauthorized disclosure and potential manipulation of SMS messages within affected organizations. This can lead to severe confidentiality breaches, exposing sensitive communications, personal data, or business-critical information transmitted via SMS. Integrity is also compromised as attackers could potentially alter or misuse message data if the system allows it beyond read access. Although availability is not affected, the exposure of SMS content can facilitate further attacks such as social engineering, fraud, or espionage. Organizations relying on OpenCode Systems OC Messaging / USSD Gateway for critical communications, especially in sectors like telecommunications, finance, healthcare, and government, face heightened risks of data leakage and regulatory non-compliance. The vulnerability’s exploitation requires only low-privileged authenticated access, increasing the likelihood of insider threats or compromised accounts being leveraged. The absence of known exploits currently provides a window for proactive mitigation, but the high CVSS score underscores the urgency for remediation to prevent potential widespread abuse.
Mitigation Recommendations
To mitigate CVE-2025-70614 effectively, organizations should first verify if they are running OpenCode Systems OC Messaging / USSD Gateway OC Release 6.32.2 or similar vulnerable versions. Immediate steps include: 1) Restricting access to the web-based control panel to trusted administrators only, employing network segmentation and strong authentication mechanisms such as multi-factor authentication (MFA). 2) Implementing strict role-based access controls (RBAC) and validating that users cannot manipulate company or tenant identifiers beyond their authorized scope. 3) Monitoring and logging all access to SMS message data and reviewing logs for suspicious activity indicative of parameter tampering. 4) Engaging with OpenCode Systems for official patches or updates addressing this vulnerability and applying them promptly once available. 5) Conducting internal security assessments and penetration tests focusing on access control enforcement within the messaging platform. 6) Educating users about the risks of credential compromise and enforcing strong password policies to reduce the risk of low-privileged account misuse. These targeted measures go beyond generic advice by focusing on access control validation, monitoring, and administrative safeguards specific to the vulnerable component.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-01-09T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69a9e67761e8e69ef5f70090
Added to database: 3/5/2026, 8:24:23 PM
Last enriched: 3/12/2026, 8:38:58 PM
Last updated: 4/20/2026, 3:31:46 AM
Views: 84
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.