CVE-2025-64065
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-25

Last updated on: 2025-12-01

Assigner: MITRE

Description
The Primakon Pi Portal 1.0.18 API /api/V2/pp_udfv_admin endpoint, fails to perform necessary server-side validation. The administrative LoginAs or user impersonation feature is vulnerable to a access control failure. This flaw allows any authenticated low-privileged user to execute a direct PATCH request, enabling them to impersonate any other arbitrary user, including application Administrators. This is due to a Broken Function Level Authorization failure (the function doesn't check the caller's privilege) compounded by an Insecure Design that permits a session switch without requiring the target user's password or an administrative token and only needs email of user.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-25
Last Modified
2025-12-01
Generated
2026-05-07
AI Q&A
2025-11-25
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
primakon project_contract_management 1.0.18
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Primakon Pi Portal 1.0.18 API at the /api/V2/pp_udfv_admin endpoint. It fails to perform necessary server-side validation for the administrative LoginAs or user impersonation feature. As a result, any authenticated low-privileged user can send a direct PATCH request to impersonate any other user, including administrators, without needing the target user's password or an administrative token. This is caused by a Broken Function Level Authorization failure and an insecure design that allows session switching based only on the target user's email.


How can this vulnerability impact me? :

This vulnerability can allow low-privileged users to impersonate higher-privileged users, including administrators, which can lead to unauthorized access to sensitive data, modification of system settings, and potentially full control over the application. This can compromise the security and integrity of the system and its data.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart