CVE-2025-64063

Primakon Pi Portal 1.0.18 API endpoints fail to enforce sufficient authorization checks when processing requests. Specifically, a standard user can exploit this flaw by sending direct HTTP requests to administrative endpoints, bypassing the UI restrictions. This allows the attacker to manipulate data outside their assigned scope, including: Unauthorized Account modification, modifying/deleting arbitrary user accounts and changing passwords by sending a direct request to the user management API endpoint; Confidential Data Access, accessing and downloading sensitive organizational documents via a direct request to the document retrieval API; Privilege escalation, This vulnerability can lead to complete compromise of data integrity and confidentiality, and Privilege Escalation by manipulating core system functions.
Configurations

Configuration 1 (hide)

cpe:2.3:a:primakon:project_contract_management:1.0.18:*:*:*:*:*:*:*

History

01 Dec 2025, 14:22

Type Values Removed Values Added
CPE cpe:2.3:a:primakon:project_contract_management:1.0.18:*:*:*:*:*:*:*
References () https://github.com/n3k7ar91/Vulnerabilites/blob/main/Primakon/CVE-2025-64063.md - () https://github.com/n3k7ar91/Vulnerabilites/blob/main/Primakon/CVE-2025-64063.md - Third Party Advisory
References () https://www.primakon.com/rjesenja/primakon-pcm/ - () https://www.primakon.com/rjesenja/primakon-pcm/ - Product
First Time Primakon project Contract Management
Primakon

26 Nov 2025, 17:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.3
v2 : unknown
v3 : 9.8

25 Nov 2025, 22:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
CWE CWE-285

25 Nov 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-25 19:15

Updated : 2025-12-01 14:22


NVD link : CVE-2025-64063

Mitre link : CVE-2025-64063

CVE.ORG link : CVE-2025-64063


JSON object : View

Products Affected

primakon

  • project_contract_management
CWE
CWE-285

Improper Authorization