Authorization Bypass Through User-Controlled Key vulnerability in Beefull Energy Technologies Beefull App allows Exploitation of Trusted Identifiers.This issue affects Beefull App: before 24.07.2025.
History

Wed, 17 Sep 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Beefull Energy
Beefull Energy beefull App
Vendors & Products Beefull Energy
Beefull Energy beefull App

Tue, 16 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 16 Sep 2025 13:00:00 +0000

Type Values Removed Values Added
Description Authorization Bypass Through User-Controlled Key vulnerability in Beefull Energy Technologies Beefull App allows Exploitation of Trusted Identifiers.This issue affects Beefull App: before 24.07.2025.
Title IDOR in Beefull Energy Technologies' Beefull App
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TR-CERT

Published: 2025-09-16T12:49:41.870Z

Updated: 2025-09-16T13:46:32.393Z

Reserved: 2025-07-08T13:13:53.840Z

Link: CVE-2025-7355

cve-icon Vulnrichment

Updated: 2025-09-16T13:46:29.931Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-16T13:16:12.107

Modified: 2025-09-17T14:18:55.093

Link: CVE-2025-7355

cve-icon Redhat

No data.