{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-13871","assignerOrgId":"64c5ae8f-7972-4697-86a0-7ada793ac795","state":"PUBLISHED","assignerShortName":"TCS-CERT","dateReserved":"2025-12-02T09:16:58.809Z","datePublished":"2025-12-02T09:42:51.187Z","dateUpdated":"2025-12-02T16:55:09.792Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unknown","product":"Opinio","vendor":"ObjectPlanet","versions":[{"status":"affected","version":"7.26 rev12562"}]}],"credits":[{"lang":"en","type":"finder","value":"Dominique Righetto"}],"datePublic":"2025-07-31T08:31:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<br>\n\nCross-Site Request Forgery (CSRF) in the resource-management feature of <em></em>\n\n<b>ObjectPlanet Opinio 7.26 rev12562</b>\n\n<em></em> allows&nbsp;to upload \nfiles on behalf of the connected users and then access such files without authentication.\n\n<br>"}],"value":"Cross-Site Request Forgery (CSRF) in the resource-management feature of \n\nObjectPlanet Opinio 7.26 rev12562\n\n allows to upload \nfiles on behalf of the connected users and then access such files without authentication."}],"impacts":[{"capecId":"CAPEC-62","descriptions":[{"lang":"en","value":"CAPEC-62 Cross Site Request Forgery"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"PRESENT","attackVector":"NETWORK","baseScore":2.3,"baseSeverity":"LOW","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"PASSIVE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-352","description":"CWE-352 Cross-Site Request Forgery (CSRF)","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"64c5ae8f-7972-4697-86a0-7ada793ac795","shortName":"TCS-CERT","dateUpdated":"2025-12-02T09:42:51.187Z"},"references":[{"tags":["release-notes"],"url":"https://www.objectplanet.com/opinio/changelog.html"}],"source":{"discovery":"EXTERNAL"},"timeline":[{"lang":"en","time":"2024-12-01T09:10:00.000Z","value":"Vulnerability discovery"},{"lang":"en","time":"2024-12-10T14:22:00.000Z","value":"Vulnerability Report to TCS-CERT"},{"lang":"en","time":"2024-12-19T15:33:00.000Z","value":"Vulnerability Report to Vendor through email : opinio@support.objectplanet.com"},{"lang":"en","time":"2024-12-24T15:34:00.000Z","value":"Feedback asked to vendor, check if the vendor received the PoC in an encrypted archive"},{"lang":"en","time":"2025-01-10T15:32:00.000Z","value":"New follow-up email was send to the vendor"},{"lang":"en","time":"2025-01-13T15:37:00.000Z","value":"Vendor confirmed the reception of the PoC, vendor asked to wait 90-day period before publishing (responsible disclosure), and will try to fix the vulnerability"},{"lang":"en","time":"2025-01-14T15:37:00.000Z","value":"Answer to vendor to acknowledge 90 days period"},{"lang":"en","time":"2025-03-10T15:38:00.000Z","value":"Vendor informed us that they will realse the fix by the end of this month"},{"lang":"en","time":"2025-04-23T14:39:00.000Z","value":"An email was sent to check where they stand on the release and fixes for the reported issues"},{"lang":"en","time":"2025-06-21T14:39:00.000Z","value":"A feedback was requested from vendor regarding their progreess"},{"lang":"en","time":"2025-06-30T14:39:00.000Z","value":"A feedback was requested from vendor regarding their progreess"},{"lang":"en","time":"2025-07-31T14:39:00.000Z","value":"The vendor released the newer fixed version which is the Opinio Version 7.27"}],"title":"The feature to manage resources is prone to Cross-Site Request Forgery attacks","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-02T16:50:36.706557Z","id":"CVE-2025-13871","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-02T16:55:09.792Z"}}]}}