This vulnerability exists in the CAP back office application due to improper authorization checks on certain API endpoints. An authenticated remote attacker could exploit this vulnerability by manipulating API request URL to gain unauthorized access to other user accounts.
Attack Vector | Network |
Attack Complexity | High |
Privileges Required | None |
User Interaction | None |
Vulnerability Complexity | High |
Vulnerability Impact | None |
Epss Score | 0 |
---|---|
Epss Percentile | 0 |
Note: Consider this fact that the EPSS model relies on historical data and real-world exploit information to calculate the probability of exploitation. When a CVE is newly published, there isn't enough data available to determine its likelihood of being exploited. As a result, the EPSS score defaults to 0 until more information becomes available.