SOPlanning is vulnerable to Broken Access Control in /status endpoint. Due to lack of permission checks in Project Status functionality an authenticated attacker is able to add, edit and delete any status.
This issue was fixed in version 1.55.
References
| Link | Resource |
|---|---|
| https://cert.pl/en/posts/2025/11/CVE-2025-62293 | Third Party Advisory |
| https://www.soplanning.org/en/ | Product |
Configurations
History
24 Nov 2025, 13:44
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://cert.pl/en/posts/2025/11/CVE-2025-62293 - Third Party Advisory | |
| References | () https://www.soplanning.org/en/ - Product | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
| CPE | cpe:2.3:a:soplanning:soplanning:*:*:*:*:*:*:*:* | |
| First Time |
Soplanning
Soplanning soplanning |
20 Nov 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-20 16:15
Updated : 2025-11-24 13:44
NVD link : CVE-2025-62293
Mitre link : CVE-2025-62293
CVE.ORG link : CVE-2025-62293
JSON object : View
Products Affected
soplanning
- soplanning
CWE
CWE-862
Missing Authorization
