Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 01 Dec 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Primakon project Contract Management
|
|
| CPEs | cpe:2.3:a:primakon:project_contract_management:1.0.18:*:*:*:*:*:*:* | |
| Vendors & Products |
Primakon project Contract Management
|
Thu, 27 Nov 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Primakon
Primakon pi Portal |
|
| Vendors & Products |
Primakon
Primakon pi Portal |
Wed, 26 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-285 | |
| Metrics |
cvssV3_1
|
Tue, 25 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Primakon Pi Portal 1.0.18 API /api/V2/pp_udfv_admin endpoint, fails to perform necessary server-side validation. The administrative LoginAs or user impersonation feature is vulnerable to a access control failure. This flaw allows any authenticated low-privileged user to execute a direct PATCH request, enabling them to impersonate any other arbitrary user, including application Administrators. This is due to a Broken Function Level Authorization failure (the function doesn't check the caller's privilege) compounded by an Insecure Design that permits a session switch without requiring the target user's password or an administrative token and only needs email of user. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-26T14:35:03.860Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-64065
Updated: 2025-11-26T14:34:57.419Z
Status : Analyzed
Published: 2025-11-25T19:15:50.643
Modified: 2025-12-01T14:22:29.673
Link: CVE-2025-64065
No data.
OpenCVE Enrichment
Updated: 2025-11-27T09:45:54Z