CVE-2025-41358

N/A Unknown

📋 TL;DR

This IDOR vulnerability in i2A's CronosWeb allows authenticated attackers to access other users' personal documents by manipulating the documentCode parameter. It affects all CronosWeb versions prior to 25.00.00.12. Any organization using vulnerable CronosWeb instances is at risk of data exposure.

💻 Affected Systems

Products:
  • i2A CronosWeb
Versions: All versions prior to 25.00.00.12
Operating Systems: Windows (typical deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authentication but no special permissions beyond basic user access.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Mass exfiltration of sensitive personal documents including identification, financial records, and confidential employee information, potentially leading to identity theft, regulatory violations, and reputational damage.

🟠

Likely Case

Targeted access to specific users' documents for espionage, blackmail, or unauthorized information gathering by malicious insiders or compromised accounts.

🟢

If Mitigated

Limited exposure if proper access controls, monitoring, and network segmentation are implemented, though the vulnerability still exists.

🌐 Internet-Facing: HIGH if CronosWeb is exposed to the internet, as authenticated attackers can exploit this remotely.
🏢 Internal Only: HIGH as authenticated internal users (including compromised accounts) can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Simple parameter manipulation attack requiring only authenticated access to the web interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 25.00.00.12 or later

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/direct-reference-insecure-objects-idor-cronosweb-cronosweb-i2a

Restart Required: Yes

Instructions:

1. Download CronosWeb version 25.00.00.12 or later from i2A. 2. Backup current installation and database. 3. Apply the update following i2A's installation guide. 4. Restart the CronosWeb service. 5. Verify the fix by testing document access controls.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rule

all

Block or alert on suspicious documentCode parameter patterns in requests to the vulnerable endpoint.

WAF-specific configuration required

Access Restriction

all

Restrict access to /CronosWeb/Modulos/Personas/DocumentosPersonales/AdjuntarDocumentosPersonas endpoint to only authorized personnel.

Firewall/load balancer configuration required

🧯 If You Can't Patch

  • Implement strict access controls and monitoring on the vulnerable endpoint
  • Deploy additional authentication/authorization layer before the vulnerable functionality

🔍 How to Verify

Check if Vulnerable:

Test if authenticated user can access another user's documents by modifying documentCode parameter in requests to /CronosWeb/Modulos/Personas/DocumentosPersonales/AdjuntarDocumentosPersonas

Check Version:

Check CronosWeb version in application interface or configuration files

Verify Fix Applied:

After patching, verify that documentCode parameter manipulation no longer allows access to unauthorized documents

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed document access attempts
  • Rapid sequential access to different documentCodes from same user
  • Access to documentCodes outside user's normal range

Network Indicators:

  • Unusual patterns of requests to the vulnerable endpoint
  • Parameter tampering in documentCode values

SIEM Query:

source="cronosweb" AND (uri_path="/CronosWeb/Modulos/Personas/DocumentosPersonales/AdjuntarDocumentosPersonas") AND (documentCode variations detected)

🔗 References

📤 Share & Export