Authorization Bypass Through User-Controlled Key vulnerability in Logo Software Inc. Logo Cloud allows Forceful Browsing, Resource Leak Exposure.This issue affects Logo Cloud: before 0.67.
History

Mon, 06 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Logo Software
Logo Software logo Cloud
Vendors & Products Logo Software
Logo Software logo Cloud

Mon, 06 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 06 Oct 2025 09:15:00 +0000

Type Values Removed Values Added
Description Authorization Bypass Through User-Controlled Key vulnerability in Logo Software Inc. Logo Cloud allows Forceful Browsing, Resource Leak Exposure.This issue affects Logo Cloud: before 0.67.
Title IDOR in Logo Software's Logo Cloud
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TR-CERT

Published:

Updated: 2025-10-06T13:18:14.549Z

Reserved: 2025-01-20T13:52:33.866Z

Link: CVE-2025-0606

cve-icon Vulnrichment

Updated: 2025-10-06T13:18:09.898Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-06T09:15:33.440

Modified: 2025-10-06T14:56:21.733

Link: CVE-2025-0606

cve-icon Redhat

No data.