Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-0987 β€” AI Deep Analysis Summary

CVSS 9.9 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: CVE-2025-0987 is a critical flaw in **CB Project CVLand**. It allows **authorization bypass** due to user-controlled keys.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-639** (Authorization Bypass Through User-Controlled Key).…

Q3Who is affected? (Versions/Components)

πŸ“± **Affected Product**: **CB Project CVLand** (Recruitment Mobile App by CB Project Ltd. Co.). <br>πŸ“… **Versions**: **2.1.0** through **20251103**. <br>🌍 **Vendor**: Turkish company CB Project.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Actions**: <br>1️⃣ **Bypass Auth**: Gain unauthorized access without valid credentials. <br>2️⃣ **Parameter Injection**: Manipulate backend parameters.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”‘ **Exploitation Threshold**: <br>βœ… **Network**: Remote (AV:N). <br>βœ… **Complexity**: Low (AC:L). <br>⚠️ **Privileges**: Requires **Low Privileges** (PR:L) to initiate. <br>πŸ‘οΈ **UI**: No User Interaction needed (UI:N).

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exploit**: **No**. <br>πŸ“‚ **PoCs**: None listed in current data. <br>⏳ **Status**: Theoretical risk based on CVSS analysis. No wild exploitation confirmed yet.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: <br>1️⃣ Verify app version is **< 20251103**. <br>2️⃣ Audit API endpoints for **user-controlled key injection**. <br>3️⃣ Monitor logs for **unauthorized access patterns** or parameter anomalies.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Official Fix**: Patch released on **2025-11-03**. <br>πŸ“ **Reference**: USOM Advisory (tr-25-0371). <br>βœ… **Action**: Update to the latest version immediately to close the authorization bypass.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: <br>1️⃣ **Restrict Access**: Limit network access to the app backend. <br>2️⃣ **Input Validation**: Strictly sanitize and validate all key inputs.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. <br>πŸ“Š **CVSS**: High severity (C:H, I:H). <br>⚑ **Priority**: Immediate patching required. The low exploitation complexity makes it a prime target for attackers.