Filtered by CWE-639
Total 1083 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-27565 1 Growatt 1 Cloud Portal 2025-11-14 5.3 Medium
An unauthenticated attacker can delete any user's "rooms" by knowing the user's and room IDs.
CVE-2025-27575 1 Growatt 1 Cloud Portal 2025-11-14 5.3 Medium
An unauthenticated attacker can obtain EV charger version and firmware upgrading history by knowing the charger ID.
CVE-2025-27719 1 Growatt 1 Cloud Portal 2025-11-14 5.3 Medium
Unauthenticated attackers can query an API endpoint and get device details.
CVE-2025-27927 1 Growatt 1 Cloud Portal 2025-11-14 5.3 Medium
An unauthenticated attackers can obtain a list of smart devices by knowing a valid username through an unprotected API.
CVE-2025-27929 1 Growatt 1 Cloud Portal 2025-11-14 5.3 Medium
Unauthenticated attackers can retrieve full list of users associated with arbitrary accounts.
CVE-2025-30257 1 Growatt 1 Cloud Portal 2025-11-14 5.3 Medium
Unauthenticated attackers can retrieve serial number of smart meters associated to a specific user account.
CVE-2025-31147 1 Growatt 1 Cloud Portal 2025-11-14 5.3 Medium
Unauthenticated attackers can query information about total energy consumed by EV chargers of arbitrary users.
CVE-2025-64523 1 Filebrowser 1 Filebrowser 2025-11-14 N/A
File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Versions prior to 2.45.1 have an Insecure Direct Object Reference (IDOR) vulnerability in the FileBrowser application's share deletion functionality. This vulnerability allows any authenticated user with share permissions to delete other users' shared links without authorization checks. The impact is significant as malicious actors can disrupt business operations by systematically removing shared files and links. This leads to denial of service for legitimate users, potential data loss in collaborative environments, and breach of data confidentiality agreements. In organizational settings, this could affect critical file sharing for projects, presentations, or document collaboration. Version 2.45.1 contains a fix for the issue.
CVE-2025-64706 1 Typebot 1 Typebot 2025-11-14 5 Medium
Typebot is an open-source chatbot builder. In version 3.9.0 up to but excluding version 3.13.0, an Insecure Direct Object Reference (IDOR) vulnerability exists in the API token management endpoint. An authenticated attacker can delete any user's API token and retrieve its value by simply knowing the target user's ID and token ID, without requiring authorization checks. Version 3.13.0 fixes the issue.
CVE-2025-41069 1 T-innova 1 Deporsite 2025-11-14 N/A
Insecure Direct Object Reference (IDOR) vulnerability in DeporSite of T-INNOVA. This vulnerability allows an attacker to access or modify unauthorized resources by manipulating requests using the 'idUsuario' parameter in ‘/ajax/TInnova_v2/Formulario_Consentimiento/llamadaAjax/obtenerDatosConsentimientos’, which could lead to the exposure or alteration os confidential data.
CVE-2025-12366 2 Softaculous, Wordpress 2 Page Builder Pagelayer, Wordpress 2025-11-14 4.3 Medium
The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.0.5 via the pagelayer_replace_page function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Author-level access and above, to replace media files belonging to other users, including administrators.
CVE-2024-12767 1 Buddyboss 1 Buddyboss Platform 2025-11-13 3.5 Low
The buddyboss-platform WordPress plugin before 2.7.60 lacks proper access controls and allows a logged-in user to view comments on private posts
CVE-2025-49952 2 Favethemes, Wordpress 2 Houzez, Wordpress 2025-11-13 6.3 Medium
Authorization Bypass Through User-Controlled Key vulnerability in favethemes Houzez houzez allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Houzez: from n/a through <= 4.1.1.
CVE-2025-64283 1 Wordpress 1 Wordpress 2025-11-13 6.5 Medium
Authorization Bypass Through User-Controlled Key vulnerability in Rometheme RTMKit rometheme-for-elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects RTMKit: from n/a through <= 1.6.7.
CVE-2025-62893 2 Mediavine, Wordpress 2 Create, Wordpress 2025-11-13 8.1 High
Authorization Bypass Through User-Controlled Key vulnerability in mediavine Create by Mediavine mediavine-create allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Create by Mediavine: from n/a through <= 1.9.14.
CVE-2025-12903 3 Mrclayton, Woocommerce, Wordpress 3 Payment Plugins Braintree For Woocommerce, Woocommerce, Wordpress 2025-11-12 7.5 High
The Payment Plugins Braintree For WooCommerce plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the wc-braintree/v1/3ds/vaulted_nonce REST API endpoint in all versions up to, and including, 3.2.78. This is due to the endpoint being registered with permission_callback set to __return_true and processing user-supplied token IDs without verifying ownership or authentication. This makes it possible for unauthenticated attackers to retrieve payment method nonces for any stored payment token in the system, which can be used to create fraudulent transactions, charge customer credit cards, or attach payment methods to other subscriptions.
CVE-2025-11532 1 Wordpress 1 Wordpress 2025-11-12 5.3 Medium
The Wisly plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.0.0 due to missing validation on the 'wishlist_id' user controlled key. This makes it possible for unauthenticated attackers to remove and add items to other user's wishlists.
CVE-2025-12126 2 Ryanmoyer, Wordpress 2 The Total Book Project, Wordpress 2025-11-12 5.4 Medium
The The Total Book Project plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.0 via several functions due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Contributor-level access and above, to perform several actions like moving/deleting/creating chapters in books that do not belong to them.
CVE-2025-27938 1 Growatt 1 Cloud Portal 2025-11-12 5.3 Medium
Unauthenticated attackers can obtain restricted information about a user's smart device collections (i.e., "rooms").
CVE-2025-27939 1 Growatt 1 Cloud Portal 2025-11-12 7.5 High
An attacker can change registered email addresses of other users and take over arbitrary accounts.