Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 25 Sep 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 25 Sep 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw has been found in Sistemas Pleno Gestão de Locação up to 2025.7.x. The impacted element is an unknown function of the file /api/areacliente/pessoa/validarCpf of the component CPF Handler. Executing manipulation of the argument pes_cpf can lead to authorization bypass. The attack can be executed remotely. The exploit has been published and may be used. Upgrading to version 2025.8.0 is sufficient to resolve this issue. It is advisable to upgrade the affected component. | |
Title | Sistemas Pleno Gestão de Locação CPF validarCpf authorization | |
Weaknesses | CWE-285 CWE-639 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-09-25T13:14:33.199Z
Reserved: 2025-09-25T06:01:51.197Z
Link: CVE-2025-10947

Updated: 2025-09-25T13:14:23.940Z

Status : Awaiting Analysis
Published: 2025-09-25T13:15:31.387
Modified: 2025-09-26T14:32:53.583
Link: CVE-2025-10947

No data.

No data.