The Primakon Pi Portal 1.0.18 API /api/V2/pp_udfv_admin endpoint, fails to perform necessary server-side validation. The administrative LoginAs or user impersonation feature is vulnerable to a access control failure. This flaw allows any authenticated low-privileged user to execute a direct PATCH request, enabling them to impersonate any other arbitrary user, including application Administrators. This is due to a Broken Function Level Authorization failure (the function doesn't check the caller's privilege) compounded by an Insecure Design that permits a session switch without requiring the target user's password or an administrative token and only needs email of user.
Metrics
Affected Vendors & Products
References
History
Thu, 27 Nov 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Primakon
Primakon pi Portal |
|
| Vendors & Products |
Primakon
Primakon pi Portal |
Wed, 26 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-285 | |
| Metrics |
cvssV3_1
|
Tue, 25 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Primakon Pi Portal 1.0.18 API /api/V2/pp_udfv_admin endpoint, fails to perform necessary server-side validation. The administrative LoginAs or user impersonation feature is vulnerable to a access control failure. This flaw allows any authenticated low-privileged user to execute a direct PATCH request, enabling them to impersonate any other arbitrary user, including application Administrators. This is due to a Broken Function Level Authorization failure (the function doesn't check the caller's privilege) compounded by an Insecure Design that permits a session switch without requiring the target user's password or an administrative token and only needs email of user. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-11-25T00:00:00.000Z
Updated: 2025-11-26T14:35:03.860Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-64065
Updated: 2025-11-26T14:34:57.419Z
Status : Awaiting Analysis
Published: 2025-11-25T19:15:50.643
Modified: 2025-11-26T15:15:54.320
Link: CVE-2025-64065
No data.