CVE-2025-64061

Primakon Pi Portal 1.0.18 /api/v2/users endpoint is vulnerable to unauthorized data exposure due to deficient access control mechanisms. Any authenticated user, regardless of their privilege level (including standard or low-privileged users), can make a GET request to this endpoint and retrieve a complete, unfiltered list of all registered application users. Crucially, the API response body for this endpoint includes password hashes.
Configurations

Configuration 1 (hide)

cpe:2.3:a:primakon:project_contract_management:1.0.18:*:*:*:*:*:*:*

History

01 Dec 2025, 14:43

Type Values Removed Values Added
First Time Primakon project Contract Management
Primakon
References () https://github.com/n3k7ar91/Vulnerabilites/blob/main/Primakon/CVE-2025-64061.md - () https://github.com/n3k7ar91/Vulnerabilites/blob/main/Primakon/CVE-2025-64061.md - Third Party Advisory
References () https://www.primakon.com/rjesenja/primakon-pcm/ - () https://www.primakon.com/rjesenja/primakon-pcm/ - Product
CPE cpe:2.3:a:primakon:project_contract_management:1.0.18:*:*:*:*:*:*:*

25 Nov 2025, 20:15

Type Values Removed Values Added
CWE CWE-497
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3

25 Nov 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-25 17:15

Updated : 2025-12-01 14:43


NVD link : CVE-2025-64061

Mitre link : CVE-2025-64061

CVE.ORG link : CVE-2025-64061


JSON object : View

Products Affected

primakon

  • project_contract_management
CWE
CWE-497

Exposure of Sensitive System Information to an Unauthorized Control Sphere