CVE-2025-41077

8.1 HIGH

📋 TL;DR

An Insecure Direct Object Reference (IDOR) vulnerability in Viafirma Inbox v4.5.13 allows authenticated users without privileges to list all users, access and modify their data, including email addresses. This enables attackers to impersonate any user via password recovery functionality, potentially gaining administrative access. All organizations using the vulnerable version are affected.

💻 Affected Systems

Products:
  • Viafirma Inbox
Versions: v4.5.13
Operating Systems: Any OS running Viafirma Inbox
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of v4.5.13 are vulnerable regardless of configuration. Requires authenticated access but no special privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all user accounts, including administrative accounts, leading to full system takeover, data theft, and unauthorized administrative actions.

🟠

Likely Case

Attackers modify email addresses of regular users to hijack accounts via password reset, then escalate to administrative accounts to gain full application control.

🟢

If Mitigated

With proper access controls and monitoring, impact limited to unauthorized data viewing with quick detection of suspicious account modifications.

🌐 Internet-Facing: HIGH - Web applications with authentication are directly exploitable if exposed to internet.
🏢 Internal Only: HIGH - Even internally, any authenticated user can exploit this to gain administrative privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but no special privileges. Simple HTTP requests can trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after v4.5.13 (specific version not specified in reference)

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-viafirma-products

Restart Required: Yes

Instructions:

1. Contact Viafirma for updated version. 2. Backup current installation. 3. Apply vendor-provided patch/upgrade. 4. Restart application services. 5. Verify fix implementation.

🔧 Temporary Workarounds

Temporary Access Control

all

Implement strict access controls at web application firewall or reverse proxy level to restrict user listing and modification endpoints.

🧯 If You Can't Patch

  • Implement network segmentation to isolate Viafirma Inbox from other critical systems
  • Enable detailed logging and monitoring for user listing/modification activities and password reset requests

🔍 How to Verify

Check if Vulnerable:

Check if running Viafirma Inbox v4.5.13 via application admin panel or version files.

Check Version:

Check application configuration files or admin interface for version information.

Verify Fix Applied:

Test authenticated user access to user listing and modification endpoints - should return access denied for non-privileged users.

📡 Detection & Monitoring

Log Indicators:

  • Multiple GET/POST requests to user listing endpoints from non-admin accounts
  • Unusual email modification events followed by password reset requests
  • User enumeration patterns in access logs

Network Indicators:

  • HTTP requests to /api/users or similar endpoints from non-privileged accounts
  • Pattern of sequential user ID requests

SIEM Query:

source="viafirma_logs" AND (uri_path="/api/users" OR uri_path="/api/user/*/modify") AND user_role!="admin"

🔗 References

📤 Share & Export