Authorization Bypass Through User-Controlled Key, Missing Authorization, Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Usta Information Systems Inc. Aybs Interaktif allows Forceful Browsing, Parameter Injection, Input Data Manipulation.This issue affects Aybs Interaktif: from 2024 through 28082025.
History

Tue, 21 Oct 2025 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Usta
Usta aybs
Vendors & Products Usta
Usta aybs

Fri, 10 Oct 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Description Authorization Bypass Through User-Controlled Key, Missing Authorization, Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Usta Information Systems Inc. Aybs Interaktif allows Forceful Browsing, Parameter Injection, Input Data Manipulation.This issue affects Aybs Interaktif: from 2024 through 28082025.
Title IDOR in Usta Information Systems' Aybs Interaktif
Weaknesses CWE-200
CWE-639
CWE-862
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TR-CERT

Published: 2025-10-10T13:56:07.123Z

Updated: 2025-10-10T19:12:02.062Z

Reserved: 2025-08-12T08:55:17.112Z

Link: CVE-2025-8887

cve-icon Vulnrichment

Updated: 2025-10-10T19:11:56.723Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-10T14:15:44.043

Modified: 2025-10-14T19:36:59.730

Link: CVE-2025-8887

cve-icon Redhat

No data.