The CGM CLININET application uses direct, sequential object identifiers "MessageID" without proper authorization checks. By modifying the parameter in the GET request, an attacker can access messages and attachments belonging to other users.
References
| Link | Resource |
|---|---|
| https://cert.pl/en/posts/2026/03/CVE-2025-10350/ | Third Party Advisory |
| https://www.cgm.com/pol_pl/products/szpital/cgm-clininet.html | Product |
Configurations
History
09 Mar 2026, 15:25
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Cgm clininet
Cgm |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| CPE | cpe:2.3:a:cgm:clininet:*:*:*:*:*:*:*:* | |
| References | () https://cert.pl/en/posts/2026/03/CVE-2025-10350/ - Third Party Advisory | |
| References | () https://www.cgm.com/pol_pl/products/szpital/cgm-clininet.html - Product |
02 Mar 2026, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-02 12:16
Updated : 2026-03-09 15:25
NVD link : CVE-2025-58402
Mitre link : CVE-2025-58402
CVE.ORG link : CVE-2025-58402
JSON object : View
Products Affected
cgm
- clininet
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
