Authorization Bypass Through User-Controlled Key vulnerability in Logo Software Inc. Logo Cloud allows Forceful Browsing, Resource Leak Exposure.This issue affects Logo Cloud: before 0.67.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.usom.gov.tr/bildirim/tr-25-0318 |
|
History
Mon, 06 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Logo Software
Logo Software logo Cloud |
|
| Vendors & Products |
Logo Software
Logo Software logo Cloud |
Mon, 06 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 06 Oct 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Authorization Bypass Through User-Controlled Key vulnerability in Logo Software Inc. Logo Cloud allows Forceful Browsing, Resource Leak Exposure.This issue affects Logo Cloud: before 0.67. | |
| Title | IDOR in Logo Software's Logo Cloud | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: TR-CERT
Published: 2025-10-06T09:10:29.759Z
Updated: 2025-10-06T13:18:14.549Z
Reserved: 2025-01-20T13:52:33.866Z
Link: CVE-2025-0606
Updated: 2025-10-06T13:18:09.898Z
Status : Awaiting Analysis
Published: 2025-10-06T09:15:33.440
Modified: 2025-10-06T14:56:21.733
Link: CVE-2025-0606
No data.