CVE-2025-41346

9.8 CRITICAL

πŸ“‹ TL;DR

CVE-2025-41346 is an authorization bypass vulnerability in WinPlus v24.11.27 that allows attackers to impersonate any user by knowing their numerical ID. This affects all users of the vulnerable software version, enabling complete account takeover and compromising all data within the application.

πŸ’» Affected Systems

Products:
  • WinPlus by InformΓ‘tica del Este
Versions: v24.11.27
Operating Systems: Windows (presumed, based on software name)
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of the specified version are vulnerable. The vulnerability appears to be in the authorization logic itself.

πŸ“¦ What is this software?

⚠️ Risk & Real-World Impact

πŸ”΄

Worst Case

Complete compromise of all user accounts and data, including administrative access, leading to data theft, destruction, or ransomware deployment.

🟠

Likely Case

Targeted account takeover of specific users to steal sensitive data, modify records, or disrupt business operations.

🟒

If Mitigated

Limited impact with proper network segmentation and monitoring, though authentication bypass remains possible.

🌐 Internet-Facing: HIGH if the application is exposed to the internet, as attackers can remotely exploit this without authentication.
🏒 Internal Only: HIGH even internally, as any user with network access could compromise other accounts.

🎯 Exploit Status

Public PoC: βœ… No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires only knowledge of a user's numerical ID, which may be predictable or discoverable. No authentication is needed to exploit.

πŸ› οΈ Fix & Mitigation

βœ… Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/stored-cross-site-scripting-xss-winplus-informatica-del-este

Restart Required: No

Instructions:

Check the vendor advisory for updates. If a patch is released, apply it immediately following vendor instructions.

πŸ”§ Temporary Workarounds

Network Isolation

all

Restrict network access to the WinPlus application to only trusted users and systems.

Use firewall rules to limit inbound connections to specific IP ranges.

User ID Obfuscation

windows

Implement additional authentication checks or use non-predictable user identifiers.

Modify application configuration if possible to require additional authentication factors.

🧯 If You Can't Patch

  • Monitor authentication logs for unusual account access patterns or multiple failed login attempts.
  • Implement strict network segmentation to isolate the vulnerable system from critical infrastructure.

πŸ” How to Verify

Check if Vulnerable:

Check the application version in the software interface or configuration files. If it is v24.11.27, it is vulnerable.

Check Version:

Check the application's 'About' section or configuration files for version information.

Verify Fix Applied:

After applying any vendor patch, test authorization controls by attempting to access another user's account with only their numerical ID.

πŸ“‘ Detection & Monitoring

Log Indicators:

  • Unusual login patterns, access from unexpected IP addresses, multiple account access from single session.

Network Indicators:

  • Unusual HTTP requests containing numerical IDs in parameters, especially to authentication endpoints.

SIEM Query:

source="winplus_logs" AND (event="authentication" AND user_id_changed OR multiple_account_access)

πŸ”— References

πŸ“€ Share & Export