Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-70141

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-18 Feb, 2026 | 00:00
Updated At-18 Feb, 2026 | 18:31
Rejected At-
Credits

SourceCodester Customer Support System 1.0 contains an incorrect access control vulnerability in ajax.php. The AJAX dispatcher does not enforce authentication or authorization before invoking administrative methods in admin_class.php based on the action parameter. An unauthenticated remote attacker can perform sensitive operations such as creating customers and deleting users (including the admin account), as well as modifying or deleting other application records (tickets, departments, comments), resulting in unauthorized data modification.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:18 Feb, 2026 | 00:00
Updated At:18 Feb, 2026 | 18:31
Rejected At:
â–¼CVE Numbering Authority (CNA)

SourceCodester Customer Support System 1.0 contains an incorrect access control vulnerability in ajax.php. The AJAX dispatcher does not enforce authentication or authorization before invoking administrative methods in admin_class.php based on the action parameter. An unauthenticated remote attacker can perform sensitive operations such as creating customers and deleting users (including the admin account), as well as modifying or deleting other application records (tickets, departments, comments), resulting in unauthorized data modification.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.sourcecodester.com/download-code?nid=14587&title=Customer+Support+System+using+PHP%2FMySQLi+with+Source+Code
N/A
https://youngkevinn.github.io/posts/CVE-2025-70141-Customer-Support-BAC/
N/A
Hyperlink: https://www.sourcecodester.com/download-code?nid=14587&title=Customer+Support+System+using+PHP%2FMySQLi+with+Source+Code
Resource: N/A
Hyperlink: https://youngkevinn.github.io/posts/CVE-2025-70141-Customer-Support-BAC/
Resource: N/A
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-306CWE-306 Missing Authentication for Critical Function
CWECWE-862CWE-862 Missing Authorization
Type: CWE
CWE ID: CWE-306
Description: CWE-306 Missing Authentication for Critical Function
Type: CWE
CWE ID: CWE-862
Description: CWE-862 Missing Authorization
Metrics
VersionBase scoreBase severityVector
3.19.4CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
Version: 3.1
Base score: 9.4
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:18 Feb, 2026 | 17:21
Updated At:18 Feb, 2026 | 19:21

SourceCodester Customer Support System 1.0 contains an incorrect access control vulnerability in ajax.php. The AJAX dispatcher does not enforce authentication or authorization before invoking administrative methods in admin_class.php based on the action parameter. An unauthenticated remote attacker can perform sensitive operations such as creating customers and deleting users (including the admin account), as well as modifying or deleting other application records (tickets, departments, comments), resulting in unauthorized data modification.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.4CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 9.4
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-306Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE-862Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-306
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-862
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.sourcecodester.com/download-code?nid=14587&title=Customer+Support+System+using+PHP%2FMySQLi+with+Source+Codecve@mitre.org
N/A
https://youngkevinn.github.io/posts/CVE-2025-70141-Customer-Support-BAC/cve@mitre.org
N/A
Hyperlink: https://www.sourcecodester.com/download-code?nid=14587&title=Customer+Support+System+using+PHP%2FMySQLi+with+Source+Code
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://youngkevinn.github.io/posts/CVE-2025-70141-Customer-Support-BAC/
Source: cve@mitre.org
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

5Records found

CVE-2019-17354
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.4||CRITICAL
EPSS-0.30% / 52.62%
||
7 Day CHG~0.00%
Published-09 Oct, 2019 | 11:57
Updated-05 Aug, 2024 | 01:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

wan.htm page on Zyxel NBG-418N v2 with firmware version V1.00(AARP.9)C0 can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify data fields of the page.

Action-Not Available
Vendor-n/aZyxel Networks Corporation
Product-nbg-418n_v2nbg-418n_v2_firmwaren/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-26833
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.4||CRITICAL
EPSS-92.53% / 99.73%
||
7 Day CHG~0.00%
Published-25 May, 2022 | 20:15
Updated-16 Sep, 2024 | 23:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper authentication vulnerability exists in the REST API functionality of Open Automation Software OAS Platform V16.00.0121. A specially-crafted series of HTTP requests can lead to unauthenticated use of the REST API. An attacker can send a series of HTTP requests to trigger this vulnerability.

Action-Not Available
Vendor-openautomationsoftwareOpen Automation Software
Product-oas_platformOAS Platform
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-10205
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.4||CRITICAL
EPSS-0.08% / 22.64%
||
7 Day CHG~0.00%
Published-17 Dec, 2024 | 01:16
Updated-17 Dec, 2024 | 14:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authorization bypass vulnerability in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer

Authentication Bypass vulnerability in Hitachi Ops Center Analyzer on Linux, 64 bit (Hitachi Ops Center Analyzer detail view component), Hitachi Infrastructure Analytics Advisor on Linux, 64 bit (Hitachi Data Center Analytics component ).This issue affects Hitachi Ops Center Analyzer: from 10.0.0-00 before 11.0.3-00; Hitachi Infrastructure Analytics Advisor: from 2.1.0-00 through 4.4.0-00.

Action-Not Available
Vendor-Hitachi, Ltd.
Product-Hitachi Infrastructure Analytics AdvisorHitachi Ops Center Analyzer
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-10265
Matching Score-4
Assigner-Alias Robotics S.L.
ShareView Details
Matching Score-4
Assigner-Alias Robotics S.L.
CVSS Score-9.4||CRITICAL
EPSS-0.36% / 57.51%
||
7 Day CHG~0.00%
Published-06 Apr, 2020 | 12:08
Updated-17 Sep, 2024 | 03:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
RVD#1443: UR dashboard server enables unauthenticated remote control of core robot functions

Universal Robots Robot Controllers Version CB2 SW Version 1.4 upwards, CB3 SW Version 3.0 and upwards, e-series SW Version 5.0 and upwards expose a service called DashBoard server at port 29999 that allows for control over core robot functions like starting/stopping programs, shutdown, reset safety and more. The DashBoard server is not protected by any kind of authentication or authorization.

Action-Not Available
Vendor-universal-robotsUniversal Robots
Product-ur3eur10ur3ur5ur10eur5eur_softwareUniversal Robots Robot Controllers CB 2, CB3, e-series
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-9137
Matching Score-4
Assigner-Moxa Inc.
ShareView Details
Matching Score-4
Assigner-Moxa Inc.
CVSS Score-8.8||HIGH
EPSS-0.14% / 34.69%
||
7 Day CHG~0.00%
Published-14 Oct, 2024 | 08:09
Updated-19 Sep, 2025 | 08:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Moxa Service Missing Authentication for Critical Function

The affected product lacks an authentication check when sending commands to the server via the Moxa service. This vulnerability allows an attacker to execute specified commands, potentially leading to unauthorized downloads or uploads of configuration files and system compromise.

Action-Not Available
Vendor-Moxa Inc.
Product-OnCell G4302-LTE4 SeriesEDS-P506E SeriesEDS-510A SeriesEDS-P510 SeriesEDS-608 SeriesICS-G7852A SeriesNAT-102 SeriesSDS-3006 SeriesICS-G7848A SeriesEDS-616 SeriesEDR-8010 SeriesEDS-611 SeriesSDS-3010 SeriesEDS-P510A SeriesEDR-G9010 SeriesTN-4900 SeriesIKS-6728A SeriesICS-G7826A SeriesICS-G7752A SeriesEDS-508A SeriesICS-G7750A SeriesICS-G7850A SeriesICS-G7748A SeriesEDS-528E SeriesPT-7728 SeriesPT-G7828 SeriesIKS-G6824A SeriesTN-G6500 SeriesSDS-G3006 SeriesEDF-G1002-BP SeriesEDS-G516E SeriesEDS-516A SeriesICS-G7528A SeriesSDS-G3008 SeriesPT-7828 SeriesEDS-408A SeriesEDS-G509 SeriesEDR-G9004 SeriesPT-G7728 SeriesEDS-510E SeriesPT-G510 SeriesICS-G7526A SeriesEDS-405A SeriesSDS-3008 SeriesSDS-G3010 SeriesTN-G4500 SeriesEDS-619 SeriesPT-G503 SeriesSDS-3016 SeriesIKS-6726A SeriesEDS-G512E SeriesSDS-G3016 SeriesEDS-505A SeriesEDS-518A SeriesEDS-518E SeriesIKS-G6524A SeriesTN-5500A SeriesEDS-G508E SeriesTN-4500A SeriesICS-G7828A Seriesedr-g9010tn-4900edr-g9004nat-102edf-g1002-bpedr-8010oncell_g4302-lte4
CWE ID-CWE-306
Missing Authentication for Critical Function
Details not found