CVE-2025-11690
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-04

Last updated on: 2025-11-10

Assigner: National Cyber Security Centre Netherlands (NCSC-NL)

Description
An Insecure Direct Object Reference (IDOR) vulnerability exists in the vehicleId parameter, allowing unauthorized access to sensitive information of other users’ vehicles. Exploiting this issue enables an attacker to retrieve data such as GPS coordinates, encryption keys, initialization vectors, model numbers, and fuel statistics belonging to other users, instead of being limited to their own vehicle data. The fix for this vulnerability is a server-side authorization fix.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-04
Last Modified
2025-11-10
Generated
2026-05-07
AI Q&A
2025-11-04
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
cfmoto ride *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Insecure Direct Object Reference (IDOR) in the vehicleId parameter. It allows an attacker to bypass authorization controls and access sensitive information of other users' vehicles by manipulating the vehicleId value. Instead of accessing only their own vehicle data, an attacker can retrieve data such as GPS coordinates, encryption keys, initialization vectors, model numbers, and fuel statistics belonging to other users.


How can this vulnerability impact me? :

Exploiting this vulnerability can lead to unauthorized disclosure of sensitive vehicle information, including location data (GPS coordinates), cryptographic keys, and vehicle details. This can compromise user privacy, enable tracking of vehicle movements, and potentially facilitate further attacks using the exposed encryption keys and other data.


What immediate steps should I take to mitigate this vulnerability?

Apply the server-side authorization fix to ensure that the vehicleId parameter cannot be used to access data of other users' vehicles. This fix should restrict access so that users can only retrieve data related to their own vehicles.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart