SOPlanning is vulnerable to Broken Access Control in /status endpoint. Due to lack of permission checks in Project Status functionality an authenticated attacker is able to add, edit and delete any status. This issue was fixed in version 1.55.
History

Mon, 24 Nov 2025 13:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:soplanning:soplanning:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Soplanning
Soplanning soplanning
Vendors & Products Soplanning
Soplanning soplanning

Thu, 20 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 20 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
Description SOPlanning is vulnerable to Broken Access Control in /status endpoint. Due to lack of permission checks in Project Status functionality an authenticated attacker is able to add, edit and delete any status. This issue was fixed in version 1.54. SOPlanning is vulnerable to Broken Access Control in /status endpoint. Due to lack of permission checks in Project Status functionality an authenticated attacker is able to add, edit and delete any status. This issue was fixed in version 1.55.
References

Thu, 20 Nov 2025 15:45:00 +0000

Type Values Removed Values Added
Description SOPlanning is vulnerable to Broken Access Control in /status endpoint. Due to lack of permission checks in Project Status functionality an authenticated attacker is able to add, edit and delete any status. This issue was fixed in version 1.54.
Title Broken Access Control in SOPlanning
Weaknesses CWE-862
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published: 2025-11-20T15:43:30.849Z

Updated: 2025-11-20T19:17:39.653Z

Reserved: 2025-10-10T06:53:21.424Z

Link: CVE-2025-62293

cve-icon Vulnrichment

Updated: 2025-11-20T19:17:08.898Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-20T16:15:59.060

Modified: 2025-11-24T13:44:41.907

Link: CVE-2025-62293

cve-icon Redhat

No data.