Vulnerability Description
The Primakon Pi Portal 1.0.18 API /api/V2/pp_udfv_admin endpoint, fails to perform necessary server-side validation. The administrative LoginAs or user impersonation feature is vulnerable to a access control failure. This flaw allows any authenticated low-privileged user to execute a direct PATCH request, enabling them to impersonate any other arbitrary user, including application Administrators. This is due to a Broken Function Level Authorization failure (the function doesn't check the caller's privilege) compounded by an Insecure Design that permits a session switch without requiring the target user's password or an administrative token and only needs email of user.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Primakon | Project Contract Management | 1.0.18 |
Related Weaknesses (CWE)
References
- https://github.com/n3k7ar91/Vulnerabilites/blob/main/Primakon/CVE-2025-64065.mdThird Party Advisory
- https://www.primakon.com/rjesenja/primakon-pcm/Product
FAQ
What is CVE-2025-64065?
CVE-2025-64065 is a vulnerability with a CVSS score of 8.8 (HIGH). The Primakon Pi Portal 1.0.18 API /api/V2/pp_udfv_admin endpoint, fails to perform necessary server-side validation. The administrative LoginAs or user impersonation feature is vulnerable to a access ...
How severe is CVE-2025-64065?
CVE-2025-64065 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-64065?
Check the references section above for vendor advisories and patch information. Affected products include: Primakon Project Contract Management.