CVE-2025-41078

8.1 HIGH

📋 TL;DR

This vulnerability in Viafirma Documents v3.7.129 allows authenticated users without proper privileges to access other users' data, manipulate user accounts, and escalate privileges by impersonating others during document generation and signing. It affects organizations using this specific version of Viafirma's document management software for electronic signatures and document workflows.

💻 Affected Systems

Products:
  • Viafirma Documents
Versions: v3.7.129
Operating Systems: All platforms running Viafirma Documents
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the authorization mechanisms and affects all deployments of this specific version regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all user accounts, unauthorized document signing with stolen identities, data exfiltration of sensitive documents, and permanent system compromise through privilege escalation.

🟠

Likely Case

Unauthorized access to other users' documents and data, creation of fake user accounts, modification of legitimate user permissions, and fraudulent document signing activities.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication controls, and monitoring, though the vulnerability still exists in the application layer.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but minimal technical skill due to authorization bypass in standard features.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after v3.7.129 (check vendor for specific fixed version)

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-viafirma-products

Restart Required: Yes

Instructions:

1. Contact Viafirma support for patched version. 2. Backup current configuration and data. 3. Apply vendor-provided patch or upgrade to fixed version. 4. Restart application services. 5. Verify authorization controls are functioning correctly.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to Viafirma Documents to only authorized users and networks

Enhanced Monitoring

all

Implement strict logging and alerting for user management and document signing activities

🧯 If You Can't Patch

  • Implement strict network access controls and isolate the vulnerable system
  • Enforce multi-factor authentication and monitor all user activity for suspicious behavior

🔍 How to Verify

Check if Vulnerable:

Check application version via admin interface or configuration files for v3.7.129

Check Version:

Check application configuration or contact vendor for version verification method

Verify Fix Applied:

Verify version is updated beyond v3.7.129 and test authorization controls with non-privileged users

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized user listing attempts
  • User creation/modification/deletion by non-admin users
  • Document signing by users not associated with those documents

Network Indicators:

  • Unusual API calls to user management endpoints
  • Multiple document signing requests from single user in short timeframe

SIEM Query:

source="viafirma" AND (event_type="user_management" OR event_type="document_sign") AND user_role!="admin"

🔗 References

📤 Share & Export