CVE-2025-61075

8.1 HIGH

📋 TL;DR

Multiple incorrect access control vulnerabilities in adata Software GmbH Mitarbeiterportal 2.15.2.0 allow authenticated low-privileged users to perform administrative functions and manipulate other users' data through unauthorized API calls. This affects organizations using the vulnerable version of the employee portal software.

💻 Affected Systems

Products:
  • adata Software GmbH Mitarbeiterportal
Versions: 2.15.2.0
Operating Systems: Not specified
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access but low privileges are sufficient.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Low-privileged authenticated users gain full administrative control, allowing data theft, manipulation, privilege escalation, and potential system compromise.

🟠

Likely Case

Unauthorized data access and manipulation by authenticated users, leading to privacy violations, data integrity issues, and privilege escalation.

🟢

If Mitigated

Limited impact with proper access controls, monitoring, and network segmentation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but appears straightforward based on vulnerability description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://www.adata.de/mitarbeiter-portal/

Restart Required: No

Instructions:

Check vendor website for security updates and patch information. Upgrade to a fixed version when available.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to the Mitarbeiterportal to trusted networks only

API Access Controls

all

Implement additional API authentication and authorization layers

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to the application
  • Enable detailed logging and monitoring of all API calls and user activities

🔍 How to Verify

Check if Vulnerable:

Check application version in admin interface or configuration files for version 2.15.2.0

Check Version:

Check application configuration or admin panel for version information

Verify Fix Applied:

Verify version has been updated beyond 2.15.2.0 and test API access controls

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized API calls from low-privileged users
  • Administrative actions performed by non-admin users
  • Unusual data access patterns

Network Indicators:

  • API requests to administrative endpoints from non-admin users
  • Unusual API call sequences

SIEM Query:

source="Mitarbeiterportal" AND (user_role="low" AND action="admin") OR (api_endpoint CONTAINS "/admin/" AND user_role!="admin")

🔗 References

📤 Share & Export