The Primakon Pi Portal 1.0.18 /api/V2/pp_users?email endpoint is used for user data filtering but lacks proper server-side validation against the authenticated session. By manipulating the email parameter to an arbitrary value (e.g., [email protected]), an attacker can assume the session and gain full access to the target user's data and privileges. Also, if the email parameter is left blank, the application defaults to the first user in the list, who is typically the application administrator, resulting in an immediate Privilege Escalation to the highest level.
Metrics
Affected Vendors & Products
References
History
Thu, 27 Nov 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Primakon
Primakon pi Portal |
|
| Vendors & Products |
Primakon
Primakon pi Portal |
Wed, 26 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-285 | |
| Metrics |
cvssV3_1
|
Tue, 25 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Primakon Pi Portal 1.0.18 /api/V2/pp_users?email endpoint is used for user data filtering but lacks proper server-side validation against the authenticated session. By manipulating the email parameter to an arbitrary value (e.g., [email protected]), an attacker can assume the session and gain full access to the target user's data and privileges. Also, if the email parameter is left blank, the application defaults to the first user in the list, who is typically the application administrator, resulting in an immediate Privilege Escalation to the highest level. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-11-25T00:00:00.000Z
Updated: 2025-11-26T14:33:07.025Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-64062
Updated: 2025-11-26T14:33:03.788Z
Status : Awaiting Analysis
Published: 2025-11-25T18:15:53.720
Modified: 2025-11-26T15:15:54.147
Link: CVE-2025-64062
No data.
ReportizFlow