Valtimo Backend Libraries, Unauthorized Object Access, CVE-2025-XXXXX (High)

Listen to this Post

The vulnerability in Valtimo backend libraries (CVE-2025-XXXXX) allows unauthorized users to access, modify, create, or delete objects via the object-api due to improper access controls. The flaw stems from insufficient endpoint authorization checks in `ObjectenApiHttpSecurityConfigurer` and ObjectManagementHttpSecurityConfigurer. Attackers can exploit this by sending crafted HTTP requests to object-api endpoints, bypassing role-based restrictions. Even if `showInDataMenu` is disabled, objects remain accessible if their URLs are exposed. This impacts all instances where object-management configurations exist, enabling data leaks or system compromise.

DailyCVE Form:

Platform: Valtimo Backend Libraries
Version: Pre-patch
Vulnerability: Unauthorized Object Access
Severity: High
Date: May 28, 2025

Prediction: Patch expected by June 10, 2025

What Undercode Say:

Exploitation:

1. Craft GET/POST requests to `/api/objecten` endpoints.

2. Enumerate objects via `/api/objecten/management`.

3. Use Burp Suite to intercept unauthenticated requests.

Detection:

grep -r "ObjectenApiHttpSecurityConfigurer" /src
curl -I http://target/api/objecten | grep 200

Mitigation:

1. Override `configure(HttpSecurity http)` in custom security config:

http.authorizeRequests()
.antMatchers("/api/objecten/").hasRole("ADMIN")
.anyRequest().authenticated();

2. Apply IP whitelisting:

location /api/objecten {
allow 192.168.1.0/24;
deny all;
}

3. Audit logs for suspicious access:

cat /var/log/valtimo/access.log | grep "POST /api/objecten"

Patch Monitoring:

wget https://github.com/valtimo-platform/valtimo-backend-libraries/releases

Temporary Fix:

Disable object-api endpoints via `application.properties`:

valtimo.object-api.enabled=false

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top