CVE-2025-10947
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-25

Last updated on: 2026-03-25

Assigner: VulDB

Description
A flaw has been found in Sistemas Pleno Gestão de Locação up to 2025.7.x. The impacted element is an unknown function of the file /api/areacliente/pessoa/validarCpf of the component CPF Handler. Executing a manipulation of the argument pes_cpf can lead to authorization bypass. The attack can be executed remotely. The exploit has been published and may be used. Upgrading to version 2025.8.0 is sufficient to resolve this issue. It is advisable to upgrade the affected component.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-25
Last Modified
2026-03-25
Generated
2026-05-07
AI Q&A
2025-09-25
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
sistemas_pleno gestao_de_locacoes 2025.7
sistemas_pleno gestao_de_locacoes 2025.8
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a flaw in the Sistemas Pleno Gestão de Locação software up to version 2025.7.x, specifically in an unknown function within the /api/areacliente/pessoa/validarCpf file of the CPF Handler component. By manipulating the argument 'pes_cpf', an attacker can bypass authorization controls remotely, potentially gaining unauthorized access. The issue can be fixed by upgrading to version 2025.8.0.


How can this vulnerability impact me? :

The vulnerability allows an attacker to bypass authorization remotely by manipulating the 'pes_cpf' argument. This means unauthorized users could gain access to restricted areas or functions within the system, potentially exposing sensitive information or performing actions without permission.


What immediate steps should I take to mitigate this vulnerability?

Upgrade Sistemas Pleno Gestão de Locação to version 2025.8.0, as this version resolves the authorization bypass issue in the /api/areacliente/pessoa/validarCpf component.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart