Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-55886 PoC — ARD GEC en Ligne 安全漏洞

Source
Associated Vulnerability
Title:ARD GEC en Ligne 安全漏洞 (CVE-2025-55886)
Description:An Insecure Direct Object Reference (IDOR) vulnerability was discovered in ARD. The flaw exists in the `fe_uid` parameter of the payment history API endpoint. An authenticated attacker can manipulate this parameter to access the payment history of other users without authorization.
Readme
# CVE-2025-55886
### Description
An Insecure Direct Object Reference (IDOR) vulnerability was discovered
in ARD. The flaw exists in the `fe_uid` parameter of the payment
history API endpoint. An authenticated attacker can manipulate this
parameter to access the payment history of other users without
authorization.

### Affected Component
```
https://services.ard.fr/?eID=tx_afereload_records&_dc=1743696277812&fe_uid={USERID]&startTimestamp=1741017877&endTimestamp=1743782677&mobile=1&page=1&start=0&limit=100
```

### Affected Product Code Base
ARD GEC en Ligne - Not versioned - **Patched on 2025-04-23**

### Reseachers
- [raphckrman](https://github.com/raphckrman)
- [tryon-dev](https://github.com/tryon-dev)
File Snapshot

[4.0K] /data/pocs/775fe5ae876681f5ce89d37c388e11cbc338525d └── [ 714] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →