CVE-2025-41091

4.3 MEDIUM

📋 TL;DR

This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in BOLD Workplanner that allows authenticated users to access calendar details using unauthorized internal identifiers. The vulnerability affects BOLD Workplanner versions prior to 2.5.25 (4935b438f9b). Attackers can exploit this to view sensitive calendar information they shouldn't have access to.

💻 Affected Systems

Products:
  • BOLD Workplanner
Versions: All versions prior to 2.5.25 (specifically before commit 4935b438f9b)
Operating Systems: Any OS running BOLD Workplanner
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to exploit. The vulnerability exists in the calendar functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could access all calendar details across the organization, potentially exposing sensitive scheduling information, meeting details, and confidential business activities.

🟠

Likely Case

Authenticated users can access calendar details of other users or departments they shouldn't have permission to view, leading to information disclosure and privacy violations.

🟢

If Mitigated

With proper input validation and authorization checks, users can only access calendar details they're explicitly authorized to view.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and knowledge of internal object identifiers. Attackers would need to enumerate or guess valid identifiers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.5.25 (commit 4935b438f9b) or later

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/insecure-direct-object-reference-gps-bold-workplanner

Restart Required: No

Instructions:

1. Update BOLD Workplanner to version 2.5.25 or later. 2. Verify the update includes commit 4935b438f9b. 3. Test calendar functionality to ensure proper authorization checks are in place.

🔧 Temporary Workarounds

Implement API-level authorization checks

all

Add server-side authorization validation for all calendar API endpoints to verify users have permission to access requested calendar objects

Use indirect reference maps

all

Replace direct object references with indirect references that are mapped server-side to actual objects with proper authorization checks

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block suspicious parameter manipulation in calendar requests
  • Enable detailed logging for all calendar access attempts and monitor for unauthorized access patterns

🔍 How to Verify

Check if Vulnerable:

Check if BOLD Workplanner version is earlier than 2.5.25. Test by attempting to access calendar details using modified internal identifiers while authenticated as a different user.

Check Version:

Check application version in admin panel or configuration files. For exact commit: verify presence of commit 4935b438f9b in version history.

Verify Fix Applied:

After updating to 2.5.25 or later, attempt to access calendar details using unauthorized internal identifiers - all such attempts should be blocked or return access denied errors.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authorization attempts for calendar objects
  • Access to calendar objects with IDs outside user's normal range
  • Unusual pattern of calendar access from single user

Network Indicators:

  • HTTP requests with manipulated calendar ID parameters
  • API calls to calendar endpoints with sequential or unusual ID values

SIEM Query:

source="bold-workplanner" AND (event="calendar_access" AND (user_id!=object_owner OR status="unauthorized"))

🔗 References

📤 Share & Export