Primakon Pi Portal 1.0.18 /api/v2/users endpoint is vulnerable to unauthorized data exposure due to deficient access control mechanisms. Any authenticated user, regardless of their privilege level (including standard or low-privileged users), can make a GET request to this endpoint and retrieve a complete, unfiltered list of all registered application users. Crucially, the API response body for this endpoint includes password hashes.
References
| Link | Resource |
|---|---|
| https://github.com/n3k7ar91/Vulnerabilites/blob/main/Primakon/CVE-2025-64061.md | Third Party Advisory |
| https://www.primakon.com/rjesenja/primakon-pcm/ | Product |
Configurations
History
No history.
Information
Published : 2025-11-25 17:15
Updated : 2025-12-01 14:43
NVD link : CVE-2025-64061
Mitre link : CVE-2025-64061
CVE.ORG link : CVE-2025-64061
JSON object : View
Products Affected
primakon
- project_contract_management
CWE
CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
