{"id":74559,"date":"2025-12-01T08:46:04","date_gmt":"2025-12-01T05:16:04","guid":{"rendered":"https:\/\/afaghhosting.net\/blog\/cve-2025-13808-orionsec-orion-ops-user-profile-usercontroller-java-update-improper-authorization\/"},"modified":"2025-12-01T08:46:04","modified_gmt":"2025-12-01T05:16:04","slug":"cve-2025-13808-orionsec-orion-ops-user-profile-usercontroller-java-update-improper-authorization","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/cve-2025-13808-orionsec-orion-ops-user-profile-usercontroller-java-update-improper-authorization\/","title":{"rendered":"CVE-2025-13808 &#8211; orionsec orion-ops User Profile UserController.java update improper authorization"},"content":{"rendered":"<p>CVE ID : CVE-2025-13808<\/p>\n<p>Published :  Dec. 1, 2025, 5:16 a.m. | 1\u00a0hour, 9\u00a0minutes ago<\/p>\n<p>Description : A flaw has been found in orionsec orion-ops up to 5925824997a3109651bbde07460958a7be249ed1. Affected by this vulnerability is the function update of the file orion-ops-api\/orion-ops-web\/src\/main\/java\/cn\/orionsec\/ops\/controller\/UserController.java of the component User Profile Handler. This manipulation of the argument ID causes improper authorization. The attack is possible to be carried out remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.<\/p>\n<p>Severity: 7.5 | HIGH<\/p>\n<p>Visit the link for more details, such as CVSS details, affected products, timeline, and more&#8230;\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CVE ID : CVE-2025-13808 Published : Dec. 1, 2025, 5:16 a.m. | 1\u00a0hour, 9\u00a0minutes ago Description : A flaw has been found in orionsec orion-ops up to 5925824997a3109651bbde07460958a7be249ed1. Affected by this vulnerability is the function update of the file orion-ops-api\/orion-ops-web\/src\/main\/java\/cn\/orionsec\/ops\/controller\/UserController.java of the component User Profile Handler. This manipulation of the argument ID causes improper authorization. &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-74559","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/74559","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=74559"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/74559\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=74559"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=74559"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=74559"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}