This vulnerability exists in the CAP back office application due to improper implementation of OTP verification mechanism in its API based login. A remote attacker with valid credentials could exploit this vulnerability by manipulating API request URL/payload. Successful exploitation of this vulnerability could allow the attacker to bypass Two-Factor Authentication (2FA) for other user accounts.
Fixes

Solution

Upgrade Rising Technosoft CAP back office application to the version 2.0.4 or later.


Workaround

No workaround given by the vendor.

History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00153}

epss

{'score': 0.0019}


Thu, 13 Mar 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 13 Mar 2025 11:30:00 +0000

Type Values Removed Values Added
Description This vulnerability exists in the CAP back office application due to improper implementation of OTP verification mechanism in its API based login. A remote attacker with valid credentials could exploit this vulnerability by manipulating API request URL/payload. Successful exploitation of this vulnerability could allow the attacker to bypass Two-Factor Authentication (2FA) for other user accounts.
Title Authentication Bypass Vulnerability in CAP back office application
Weaknesses CWE-288
References
Metrics cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-In

Published:

Updated: 2025-03-13T19:36:11.734Z

Reserved: 2025-03-13T06:38:16.282Z

Link: CVE-2025-29996

cve-icon Vulnrichment

Updated: 2025-03-13T19:36:08.109Z

cve-icon NVD

Status : Received

Published: 2025-03-13T12:15:13.980

Modified: 2025-03-13T12:15:13.980

Link: CVE-2025-29996

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.