CVE-2025-64063
BaseFortify
Publication date: 2025-11-25
Last updated on: 2025-12-01
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| primakon | project_contract_management | 1.0.18 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-285 | The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The impact of this vulnerability includes unauthorized account modifications, deletion of arbitrary user accounts, unauthorized access to confidential organizational documents, and privilege escalation. This can lead to a complete compromise of data integrity and confidentiality within the affected system.
Can you explain this vulnerability to me?
This vulnerability in Primakon Pi Portal 1.0.18 occurs because the API endpoints do not enforce sufficient authorization checks. As a result, a standard user can bypass the user interface restrictions by sending direct HTTP requests to administrative API endpoints. This allows unauthorized actions such as modifying or deleting user accounts, changing passwords, accessing sensitive documents, and escalating privileges.