CVE-2025-5192

| EUVD-2025-17103 HIGH
2025-06-06 [email protected]
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 18:10 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 18:10 euvd
EUVD-2025-17103
CVE Published
Jun 06, 2025 - 10:15 nvd
HIGH 7.5

Description

A missing authentication for critical function vulnerability in the client application of Soar Cloud HRD Human Resource Management System through version 7.3.2025.0408 allows remote attackers to bypass authentication and access application functions.

Analysis

Missing authentication vulnerability in Soar Cloud HRD Human Resource Management System versions up to 7.3.2025.0408 that allows unauthenticated remote attackers to bypass authentication controls and access critical application functions. The vulnerability has a CVSS score of 7.5 (High) with high confidentiality impact, indicating attackers can read sensitive HR data without credentials. While specific KEV or active exploitation status is not confirmed in available data, the network-accessible nature (AV:N), lack of authentication requirement (PR:N), and criticality of HR systems suggest elevated real-world risk.

Technical Context

This vulnerability stems from CWE-306 (Missing Authentication for Critical Function), a design flaw where critical operations in the Soar Cloud HRD client application lack proper authentication mechanisms. The affected product is a cloud-based Human Resource Management System, which typically processes sensitive employee data, payroll information, and organizational records. The vulnerability likely exists in API endpoints, web interfaces, or client-server communication channels that fail to validate user identity before exposing critical functions. The CVSS vector indicates the flaw is remotely exploitable over a network (AV:N) with low attack complexity (AC:L), meaning no special conditions or tools are required—attackers can exploit this through standard HTTP/HTTPS requests without authentication headers or session tokens.

Affected Products

Soar Cloud HRD Human Resource Management System versions 7.3.2025.0408 and all prior versions. CPE would be structured as: cpe:2.3:a:soar:hrd:*:*:*:*:*:cloud:*:* (version <=7.3.2025.0408). The vendor advisory and patch availability should be obtained directly from Soar's security portal or vendor documentation; based on the version numbering scheme (date-based: 2025.0408 = April 8, 2025), patches may be released in subsequent maintenance builds (7.3.2025.0409 or later, or version 7.4 series). Organizations should check Soar's official security advisories for confirmed patch versions.

Remediation

Immediate actions: (1) Apply the latest security patch from Soar Cloud—contact vendor support or check https://[vendor-security-portal] for version 7.3.2025.0409 or newer; (2) If patches are unavailable, implement network-level access controls: restrict client application access to authenticated internal networks only, use a WAF to enforce authentication headers on all API endpoints, and require VPN/proxy authentication; (3) Conduct a data access audit to determine if the vulnerability has been exploited—review application logs, API access logs, and data export patterns for unauthorized access; (4) Disable or restrict access to non-essential critical functions until patched; (5) Implement API gateway authentication enforcement as a temporary mitigation. Long-term: update to version 7.4 or later once released with confirmed fixes, and implement security code review processes to prevent CWE-306 issues in future releases.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +38
POC: 0

Share

CVE-2025-5192 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy