Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 01 Dec 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Primakon project Contract Management
|
|
| CPEs | cpe:2.3:a:primakon:project_contract_management:1.0.18:*:*:*:*:*:*:* | |
| Vendors & Products |
Primakon project Contract Management
|
Thu, 27 Nov 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Primakon
Primakon pi Portal |
|
| Vendors & Products |
Primakon
Primakon pi Portal |
Wed, 26 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 25 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-285 | |
| Metrics |
cvssV3_1
|
Tue, 25 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Primakon Pi Portal 1.0.18 API endpoints fail to enforce sufficient authorization checks when processing requests. Specifically, a standard user can exploit this flaw by sending direct HTTP requests to administrative endpoints, bypassing the UI restrictions. This allows the attacker to manipulate data outside their assigned scope, including: Unauthorized Account modification, modifying/deleting arbitrary user accounts and changing passwords by sending a direct request to the user management API endpoint; Confidential Data Access, accessing and downloading sensitive organizational documents via a direct request to the document retrieval API; Privilege escalation, This vulnerability can lead to complete compromise of data integrity and confidentiality, and Privilege Escalation by manipulating core system functions. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-26T16:50:38.299Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-64063
Updated: 2025-11-25T21:23:36.775Z
Status : Analyzed
Published: 2025-11-25T19:15:50.373
Modified: 2025-12-01T14:22:04.163
Link: CVE-2025-64063
No data.
OpenCVE Enrichment
Updated: 2025-11-27T16:27:55Z