CVE-2025-62293

5.4 MEDIUM

📋 TL;DR

SOPlanning versions before 1.55 have a broken access control vulnerability in the /status endpoint that allows authenticated attackers to manipulate project statuses without proper authorization. This affects all SOPlanning installations running vulnerable versions. Attackers can add, edit, or delete any project status regardless of their permissions.

💻 Affected Systems

Products:
  • SOPlanning
Versions: All versions before 1.55
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all SOPlanning deployments with the vulnerable version, regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could disrupt project management workflows by deleting critical statuses or creating misleading statuses, potentially causing operational confusion, project delays, or data integrity issues across all projects.

🟠

Likely Case

Malicious users with regular accounts could tamper with project statuses they shouldn't have access to, causing minor to moderate disruption in project tracking and reporting.

🟢

If Mitigated

With proper network segmentation and monitoring, impact would be limited to unauthorized status modifications within the application, which could be detected and rolled back.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access but no special privileges. Exploitation is straightforward via HTTP requests to the /status endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.55

Vendor Advisory: https://www.soplanning.org/en/

Restart Required: Yes

Instructions:

1. Backup your SOPlanning installation and database
2. Download version 1.55 from the official SOPlanning website
3. Replace existing files with the new version
4. Restart the web server/service
5. Verify the application is functioning correctly

🔧 Temporary Workarounds

Block /status endpoint access

all

Temporarily block access to the vulnerable endpoint using web server configuration or WAF rules

# Apache: RewriteRule ^/status - [F]
# Nginx: location /status { deny all; }

Implement application-level access control

all

Add custom permission checks in the application code for the status functionality

🧯 If You Can't Patch

  • Implement strict network segmentation to limit access to SOPlanning only to authorized users
  • Enable detailed logging of all status modification attempts and monitor for unauthorized changes

🔍 How to Verify

Check if Vulnerable:

Check if your SOPlanning version is below 1.55 by visiting the application's about page or checking the version file

Check Version:

Check the application interface or look for version information in the source code

Verify Fix Applied:

After upgrading to version 1.55, test that authenticated users without admin privileges cannot modify statuses they shouldn't have access to

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST/PUT/DELETE requests to /status endpoint from non-admin users
  • Multiple status modification attempts from single user accounts
  • Status changes occurring outside normal business hours

Network Indicators:

  • HTTP requests to /status endpoint with modification parameters from unauthorized IPs

SIEM Query:

source="soplanning.log" AND (uri_path="/status" AND (http_method="POST" OR http_method="PUT" OR http_method="DELETE"))

🔗 References

📤 Share & Export