CVE-2025-9619: Improper Control of Resource Identifiers in E4 Sistemas Mercatus ERP
A security flaw has been discovered in E4 Sistemas Mercatus ERP 2.00.019. The affected element is an unknown function of the file /basico/webservice/imprimir-danfe/id/. Performing manipulation results in improper control of resource identifiers. It is possible to initiate the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-9619 is a medium-severity vulnerability affecting E4 Sistemas Mercatus ERP version 2.00.019. The flaw arises from improper control of resource identifiers within an unspecified function located at the path /basico/webservice/imprimir-danfe/id/. This vulnerability allows an unauthenticated remote attacker to manipulate resource identifiers, potentially leading to unauthorized access or manipulation of resources within the ERP system. The vulnerability does not require any user interaction or privileges, and can be exploited over the network, increasing its risk profile. The CVSS 4.0 base score is 6.9, reflecting a medium severity primarily due to the lack of authentication and ease of remote exploitation, but limited impact on confidentiality, integrity, or availability (only a low impact on confidentiality). The vendor, E4 Sistemas, has not responded to disclosure attempts, and no patches or mitigations have been published yet. No known exploits are currently active in the wild. The vulnerability likely stems from insufficient validation or authorization checks on resource identifiers, which could allow attackers to access or manipulate documents or data related to the ERP’s document printing web service (imprimir-danfe).
Potential Impact
For European organizations using Mercatus ERP 2.00.019, this vulnerability poses a risk of unauthorized access to sensitive business documents or data managed by the ERP system, particularly those related to invoicing or fiscal documents (as implied by 'danfe', a Brazilian electronic invoice document). Although the impact on confidentiality is rated low, unauthorized access could lead to exposure of sensitive financial or operational data, potentially facilitating fraud or data leakage. The lack of integrity and availability impact reduces the risk of system disruption, but data exposure alone can have regulatory and reputational consequences under GDPR and other European data protection laws. Since the vulnerability is remotely exploitable without authentication, attackers could leverage it to gain footholds or gather intelligence on business operations. The absence of vendor response and patches increases the window of exposure, necessitating proactive mitigation by affected organizations. The threat is more acute for companies with ERP deployments accessible from external networks or insufficiently segmented internal networks.
Mitigation Recommendations
Given the lack of official patches, European organizations should implement compensating controls immediately. These include restricting network access to the affected ERP web service endpoints via firewalls or network segmentation, allowing only trusted internal IP ranges to communicate with /basico/webservice/imprimir-danfe/id/. Implement web application firewalls (WAFs) with custom rules to detect and block suspicious manipulation of resource identifiers targeting this endpoint. Conduct thorough access control reviews to ensure that ERP users have minimal necessary privileges and monitor logs for anomalous access patterns related to the printing service. If possible, disable or restrict the vulnerable web service functionality until a vendor patch is available. Organizations should also engage with E4 Sistemas for updates and monitor threat intelligence feeds for emerging exploits. Regular backups and incident response readiness are advisable to mitigate potential exploitation consequences.
Affected Countries
Portugal, Spain, Italy, Germany, France, Netherlands
CVE-2025-9619: Improper Control of Resource Identifiers in E4 Sistemas Mercatus ERP
Description
A security flaw has been discovered in E4 Sistemas Mercatus ERP 2.00.019. The affected element is an unknown function of the file /basico/webservice/imprimir-danfe/id/. Performing manipulation results in improper control of resource identifiers. It is possible to initiate the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-9619 is a medium-severity vulnerability affecting E4 Sistemas Mercatus ERP version 2.00.019. The flaw arises from improper control of resource identifiers within an unspecified function located at the path /basico/webservice/imprimir-danfe/id/. This vulnerability allows an unauthenticated remote attacker to manipulate resource identifiers, potentially leading to unauthorized access or manipulation of resources within the ERP system. The vulnerability does not require any user interaction or privileges, and can be exploited over the network, increasing its risk profile. The CVSS 4.0 base score is 6.9, reflecting a medium severity primarily due to the lack of authentication and ease of remote exploitation, but limited impact on confidentiality, integrity, or availability (only a low impact on confidentiality). The vendor, E4 Sistemas, has not responded to disclosure attempts, and no patches or mitigations have been published yet. No known exploits are currently active in the wild. The vulnerability likely stems from insufficient validation or authorization checks on resource identifiers, which could allow attackers to access or manipulate documents or data related to the ERP’s document printing web service (imprimir-danfe).
Potential Impact
For European organizations using Mercatus ERP 2.00.019, this vulnerability poses a risk of unauthorized access to sensitive business documents or data managed by the ERP system, particularly those related to invoicing or fiscal documents (as implied by 'danfe', a Brazilian electronic invoice document). Although the impact on confidentiality is rated low, unauthorized access could lead to exposure of sensitive financial or operational data, potentially facilitating fraud or data leakage. The lack of integrity and availability impact reduces the risk of system disruption, but data exposure alone can have regulatory and reputational consequences under GDPR and other European data protection laws. Since the vulnerability is remotely exploitable without authentication, attackers could leverage it to gain footholds or gather intelligence on business operations. The absence of vendor response and patches increases the window of exposure, necessitating proactive mitigation by affected organizations. The threat is more acute for companies with ERP deployments accessible from external networks or insufficiently segmented internal networks.
Mitigation Recommendations
Given the lack of official patches, European organizations should implement compensating controls immediately. These include restricting network access to the affected ERP web service endpoints via firewalls or network segmentation, allowing only trusted internal IP ranges to communicate with /basico/webservice/imprimir-danfe/id/. Implement web application firewalls (WAFs) with custom rules to detect and block suspicious manipulation of resource identifiers targeting this endpoint. Conduct thorough access control reviews to ensure that ERP users have minimal necessary privileges and monitor logs for anomalous access patterns related to the printing service. If possible, disable or restrict the vulnerable web service functionality until a vendor patch is available. Organizations should also engage with E4 Sistemas for updates and monitor threat intelligence feeds for emerging exploits. Regular backups and incident response readiness are advisable to mitigate potential exploitation consequences.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-28T18:41:26.269Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b129ecad5a09ad00740d30
Added to database: 8/29/2025, 4:17:48 AM
Last enriched: 8/29/2025, 4:32:58 AM
Last updated: 8/29/2025, 5:16:23 AM
Views: 3
Related Threats
CVE-2025-54777: Uncaught exception in Konica Minolta, Inc. Multiple products in bizhub series
MediumCVE-2025-9441: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in iatspaymentsdev iATS Online Forms
MediumCVE-2025-9374: CWE-352 Cross-Site Request Forgery (CSRF) in briancolinger Ultimate Tag Warrior Importer
MediumCVE-2025-8619: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in garbowza OSM Map Widget for Elementor
MediumCVE-2025-8290: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in weblineindia List Subpages
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.