CVE-2026-25197

Unknown · Multiple Products

A specific API endpoint in the affected software allows authenticated users to pivot to other user profiles. By modifying the ID number in API calls, users can access unauthorized data.

Executive summary

An authenticated Insecure Direct Object Reference (IDOR) vulnerability allows users to access and potentially modify unauthorized profiles by manipulating API parameters.

Vulnerability

This vulnerability is an IDOR flaw located in a specific API endpoint. It allows an authenticated user to pivot to other user profiles by simply modifying the 'id' number within the API call, bypassing intended access controls.

Business impact

The impact of this vulnerability includes unauthorized access to sensitive user information and potential account takeovers. With a CVSS score of 9.1, this is a critical risk as it allows lateral movement between user accounts. This could lead to significant privacy violations, regulatory non-compliance, and loss of customer trust.

Remediation

Immediate Action: Apply the latest security patches provided by the vendor to enforce proper authorization checks on all API endpoints.

Proactive Monitoring: Review API access logs for patterns of sequential ID requests or requests for IDs that do not match the authenticated user's session.

Compensating Controls: Deploy an API gateway or WAF capable of performing deep packet inspection to validate that the requested resource ID matches the user's authorization token.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Although this vulnerability requires authentication, the ability to access any user profile makes it a critical threat. Organizations should immediately update the affected software to the latest version. Developers should ensure that all resource requests are validated against the current user's session permissions to prevent future IDOR occurrences.