Authorization Bypass Through User-Controlled Key vulnerability in Turtek Software Eyotek allows Exploitation of Trusted Identifiers.This issue affects Eyotek: before 23.06.2025.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://www.usom.gov.tr/bildirim/tr-25-0163 |     | 
History
                    Mon, 21 Jul 2025 13:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Mon, 21 Jul 2025 11:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Authorization Bypass Through User-Controlled Key vulnerability in Turtek Software Eyotek allows Exploitation of Trusted Identifiers.This issue affects Eyotek: before 23.06.2025. | |
| Title | IDOR in Turtek Software's Eyotek | |
| Weaknesses | CWE-639 | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: TR-CERT
Published: 2025-07-21T11:05:46.927Z
Updated: 2025-07-21T12:16:13.221Z
Reserved: 2025-06-04T13:20:04.217Z
Link: CVE-2025-5681
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-07-21T12:16:09.983Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-07-21T11:15:23.930
Modified: 2025-07-22T13:06:07.260
Link: CVE-2025-5681
 Redhat
                        Redhat
                    No data.