CVE-2025-41092
BaseFortify
Publication date: 2025-09-30
Last updated on: 2025-10-08
Assigner: Spanish National Cybersecurity Institute, S.A. (INCIBE)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| boldworkplanner | bold_workplanner | to 2.5.25 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-639 | The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Insecure Direct Object Reference (IDOR) in BOLD Workplanner versions prior to 2.5.25. It occurs due to insufficient validation of user input, which allows an authenticated user to access sensitive time record details and other employee information by exploiting unauthorized internal identifiers. [1]
How can this vulnerability impact me? :
The vulnerability can allow an authenticated user to access sensitive employee information such as employee numbers, names, national identity numbers, clock-in records, holiday requests, absences, and contract details without authorization. This unauthorized access can lead to privacy breaches and potential misuse of sensitive data. [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to upgrade BOLD Workplanner to version 2.5.25 or later, where the issue has been fixed by GPS. [1]