CVE-2025-52389
BaseFortify
Publication date: 2025-09-08
Last updated on: 2025-09-09
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| envasadora_h2o_eireli | soda_cristal | 40.20.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-639 | The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-52389 is an Insecure Direct Object Reference (IDOR) vulnerability in Envasadora H2O Eireli's Soda Cristal application version 40.20.4. It allows attackers to access sensitive data of other users by manipulating a parameter in the URL, specifically the contract number. By crafting a special HTTP request, an attacker can view contracts of other customers without proper authentication due to improper access control on direct object references. [1]
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized access to sensitive user data, such as contracts belonging to other customers. This exposure can result in privacy breaches, potential identity theft, and loss of trust in the affected service. Attackers can exploit this flaw to gather confidential information without needing to authenticate, increasing the risk of data leakage. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by sending crafted HTTP requests that manipulate the contract number parameter in the URL to access other users' data. Tools like Burp Suite can be used to intercept and modify requests, filtering by site length to identify accessible contracts. For example, you can use Burp Suite's proxy to capture requests to URLs like https://www.app.sodacristal.com/contrato/#contract_number# and modify the contract_number parameter to test access to other users' contracts. [1]