- Description
- An authorization bypass in Unblu Spark allows a participant of a conversation to replace an existing, uploaded file. Every uploaded file in Unblu gets assigned with a randomly generated Universally Unique ID (UUID). In case a participant of this or another conversation gets access to such a file ID, it can be used to replace the file without changing the file name and details or the name of the user who uploaded the file. During the upload, file interception and allowed file type rules are still applied correctly.
- Source
- vulnerability@ncsc.ch
- NVD status
- Awaiting Analysis
CVSS 4.0
- Type
- Secondary
- Base score
- 7
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- HIGH
- vulnerability@ncsc.ch
- CWE-639
- Hype score
- Not currently trending
🚨 CVE-2025-3519 🔴 HIGH (7) 🏢 Unblu inc. - Unblu Spark 🏗️ 8.13.1 🔗 https://t.co/vIcr9rmydh #CyberCron #VulnAlert #InfoSec https://t.co/aTsH3TMW5d
@cybercronai
22 Apr 2025
9 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-3519 An authorization bypass in Unblu Spark allows a participant of a conversation to replace an existing, uploaded file. Every uploaded file in Unblu gets assigned with a … https://t.co/Dnzs0VkUCe
@CVEnew
22 Apr 2025
357 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes