Featured image of post CVE-2025-8790

CVE-2025-8790

Broken Access Control

CVE-2025-8790: Broken Object Level Authorization (BOLA) in pessoa API Endpoint Allows Unauthorized Access to Other Users Data

CVE Publication: https://www.cve.org/CVERecord?id=CVE-2025-8790

Summary

A Broken Object Level Authorization (BOLA) vulnerability was identified in the i-educar 2.8 and 2.9 API, allowing any authenticated low-privileged user to access sensitive information from other users by manipulating the id parameter in the pessoa resource endpoint.

Details

The endpoint /module/Api/pessoa lacks proper authorization checks to ensure that the authenticated user is only able to access their own data.

By altering the id parameter in the following request, any authenticated user can retrieve information about other users:

GET /module/Api/pessoa?&oper=get&resource=pessoa&id=1 HTTP/1.1

PoC

  • 1. Authenticate as a non-privileged user (e.g., student, professor).

  • 2. Send the following request targeting id=1 user:

1
2
GET /module/Api/pessoa?&oper=get&resource=pessoa&id=1 HTTP/1.1
Cookie: i_educar_session=VALID_SESSION_COOKIE }

  • 3. Observe that user data for id=1 is returned, even if the logged-in user is not authorized to access that profile:

Impact

This vulnerability is a Broken Object Level Authorization (BOLA) issue (OWASP API Top 10 - 2023, A01), allowing sensitive data exposure. Any authenticated user can access personal information of other users. This can lead to:

  • Unauthorized access to sensitive PII;
  • Violation of data protection laws (e.g., LGPD, GDPR);
  • Potential abuse of user data or impersonation;
  • User enumeration.

Reference

https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8790.md

Finder

Natan Maia Morette

By: CVE-Hunters

Built with Hugo
Theme Stack designed by Jimmy