SOPlanning is vulnerable to Broken Access Control in /status endpoint. Due to lack of permission checks in Project Status functionality an authenticated attacker is able to add, edit and delete any status.
This issue was fixed in version 1.55.
References
| Link | Resource |
|---|---|
| https://cert.pl/en/posts/2025/11/CVE-2025-62293 | Third Party Advisory |
| https://www.soplanning.org/en/ | Product |
Configurations
History
24 Nov 2025, 13:44
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:soplanning:soplanning:*:*:*:*:*:*:*:* | |
| First Time |
Soplanning soplanning
Soplanning |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
| References | () https://cert.pl/en/posts/2025/11/CVE-2025-62293 - Third Party Advisory | |
| References | () https://www.soplanning.org/en/ - Product |
20 Nov 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-20 16:15
Updated : 2025-11-24 13:44
NVD link : CVE-2025-62293
Mitre link : CVE-2025-62293
CVE.ORG link : CVE-2025-62293
JSON object : View
Products Affected
soplanning
- soplanning
CWE
CWE-862
Missing Authorization
