CVE-2025-64064

Primakon Pi Portal 1.0.18 /api/v2/pp_users endpoint fails to adequately check user permissions before processing a PATCH request to modify the PP_SECURITY_PROFILE_ID. Because of weak access controls any low level user can use this API and change their permission to Administrator by using PP_SECURITY_PROFILE_ID=2 inside body of request and escalate privileges.
Configurations

Configuration 1 (hide)

cpe:2.3:a:primakon:project_contract_management:1.0.18:*:*:*:*:*:*:*

History

01 Dec 2025, 14:22

Type Values Removed Values Added
First Time Primakon project Contract Management
Primakon
CPE cpe:2.3:a:primakon:project_contract_management:1.0.18:*:*:*:*:*:*:*
References () https://github.com/n3k7ar91/Vulnerabilites/blob/main/Primakon/CVE-2025-64064.md - () https://github.com/n3k7ar91/Vulnerabilites/blob/main/Primakon/CVE-2025-64064.md - Third Party Advisory
References () https://www.primakon.com/rjesenja/primakon-pcm/ - () https://www.primakon.com/rjesenja/primakon-pcm/ - Product

25 Nov 2025, 21:15

Type Values Removed Values Added
CWE CWE-284
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

25 Nov 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-25 19:15

Updated : 2025-12-01 14:22


NVD link : CVE-2025-64064

Mitre link : CVE-2025-64064

CVE.ORG link : CVE-2025-64064


JSON object : View

Products Affected

primakon

  • project_contract_management
CWE
CWE-284

Improper Access Control