CVE-2025-64062 - Primakon Pi Portal Session Hijacking and Privilege Escalation

CVE-2025-64062 - Primakon Pi Portal Session Hijacking and Privilege Escalation

CVE ID : CVE-2025-64062 Published : Nov. 25, 2025, 6:15 p.m. | 30 minutes ago Description : The Primakon Pi Portal 1.0.18 /api/V2/pp_users?email endpoint is used for user data filtering but lacks proper server-side validation against the authenticated session. By manipulating the email parameter to an arbitrary value (e.g., [email protected]), an attacker can assume the session and gain full access to the target user's data and privileges. Also, if the email parameter is left blank, the application defaults to the first user in the list, who is typically the application administrator, resulting in an immediate Privilege Escalation to the highest level. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Published
Nov. 25, 2025
Impact: Privilege Escalation

Source: Telegram CVE Monitor