The Primakon Pi Portal 1.0.18 /api/V2/pp_users?email endpoint is used for user data filtering but lacks proper server-side validation against the authenticated session. By manipulating the email parameter to an arbitrary value (e.g., [email protected]), an attacker can assume the session and gain full access to the target user's data and privileges. Also, if the email parameter is left blank, the application defaults to the first user in the list, who is typically the application administrator, resulting in an immediate Privilege Escalation to the highest level.
History

Thu, 27 Nov 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Primakon
Primakon pi Portal
Vendors & Products Primakon
Primakon pi Portal

Wed, 26 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-285
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 25 Nov 2025 18:15:00 +0000

Type Values Removed Values Added
Description The Primakon Pi Portal 1.0.18 /api/V2/pp_users?email endpoint is used for user data filtering but lacks proper server-side validation against the authenticated session. By manipulating the email parameter to an arbitrary value (e.g., [email protected]), an attacker can assume the session and gain full access to the target user's data and privileges. Also, if the email parameter is left blank, the application defaults to the first user in the list, who is typically the application administrator, resulting in an immediate Privilege Escalation to the highest level.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-11-25T00:00:00.000Z

Updated: 2025-11-26T14:33:07.025Z

Reserved: 2025-10-27T00:00:00.000Z

Link: CVE-2025-64062

cve-icon Vulnrichment

Updated: 2025-11-26T14:33:03.788Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-25T18:15:53.720

Modified: 2025-11-26T15:15:54.147

Link: CVE-2025-64062

cve-icon Redhat

No data.