CVE-2025-52389
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-08

Last updated on: 2025-09-09

Assigner: MITRE

Description
An Insecure Direct Object Reference (IDOR) in Envasadora H2O Eireli - Soda Cristal v40.20.4 allows authenticated attackers to access sensitive data for other users via a crafted HTTP request.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-08
Last Modified
2025-09-09
Generated
2026-05-07
AI Q&A
2025-09-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
envasadora_h2o_eireli soda_cristal 40.20.4
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-52389 is an Insecure Direct Object Reference (IDOR) vulnerability in Envasadora H2O Eireli's Soda Cristal application version 40.20.4. It allows attackers to access sensitive data of other users by manipulating a parameter in the URL, specifically the contract number. By crafting a special HTTP request, an attacker can view contracts of other customers without proper authentication due to improper access control on direct object references. [1]


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized access to sensitive user data, such as contracts belonging to other customers. This exposure can result in privacy breaches, potential identity theft, and loss of trust in the affected service. Attackers can exploit this flaw to gather confidential information without needing to authenticate, increasing the risk of data leakage. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by sending crafted HTTP requests that manipulate the contract number parameter in the URL to access other users' data. Tools like Burp Suite can be used to intercept and modify requests, filtering by site length to identify accessible contracts. For example, you can use Burp Suite's proxy to capture requests to URLs like https://www.app.sodacristal.com/contrato/#contract_number# and modify the contract_number parameter to test access to other users' contracts. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart