CVE-2025-3660 Overview
CVE-2025-3660 is a broken access control vulnerability affecting Petlibro Smart Pet Feeder Platform versions up to 1.7.31. The vulnerability allows authenticated users to access other users' pet data by exploiting missing ownership verification in the API endpoint /member/pet/detailV2. Attackers can send requests with arbitrary pet IDs to retrieve sensitive information including pet details, member IDs, and avatar URLs without proper authorization checks.
Critical Impact
Authenticated attackers can enumerate and access sensitive pet and user data belonging to other platform users, potentially exposing personal information and enabling further targeted attacks.
Affected Products
- Petlibro Smart Pet Feeder Platform versions up to 1.7.31
Discovery Timeline
- 2026-01-04 - CVE CVE-2025-3660 published to NVD
- 2026-01-08 - Last updated in NVD database
Technical Details for CVE-2025-3660
Vulnerability Analysis
This vulnerability is classified as CWE-612 (Improper Authorization of Index Containing Sensitive Information) and represents a classic Insecure Direct Object Reference (IDOR) pattern. The Petlibro Smart Pet Feeder Platform fails to implement proper ownership verification when processing API requests to retrieve pet information.
When an authenticated user makes a request to the /member/pet/detailV2 endpoint, the application accepts a pet ID parameter but does not validate whether the requesting user has authorization to access that specific pet's data. This architectural flaw enables horizontal privilege escalation, where any authenticated user can access data belonging to other users simply by manipulating the pet ID value in their requests.
The exposed information includes pet details, member IDs, and avatar URLs. While this may seem benign in isolation, the disclosure of member IDs could facilitate further attacks against the platform, and avatar URLs may reveal additional personal information about device owners.
Root Cause
The root cause is missing authorization logic in the /member/pet/detailV2 API endpoint. The application correctly authenticates users but fails to verify that the authenticated user owns or has permission to view the requested pet resource. This is a fundamental access control design flaw where authentication is implemented but authorization checks are absent.
Attack Vector
The attack is network-based and requires only low-privilege authenticated access to the Petlibro platform. An attacker would:
- Authenticate to the Petlibro Smart Pet Feeder Platform with valid credentials
- Intercept or craft a request to the /member/pet/detailV2 endpoint
- Modify the pet ID parameter to reference arbitrary pet resources
- Enumerate through pet IDs to systematically harvest other users' data
The vulnerability requires no user interaction and can be exploited with simple HTTP request manipulation. The attacker can retrieve pet details, member IDs, and avatar URLs for any pet registered on the platform by iterating through pet ID values.
Detection Methods for CVE-2025-3660
Indicators of Compromise
- Unusual volume of requests to /member/pet/detailV2 endpoint from a single authenticated session
- Sequential or enumeration patterns in pet ID parameters across multiple requests
- API requests returning data for pets not associated with the requesting user's account
- Anomalous access patterns showing a single user accessing multiple unrelated pet profiles
Detection Strategies
- Implement API request logging with correlation between authenticated user identity and accessed resources
- Deploy web application firewall (WAF) rules to detect parameter enumeration patterns
- Monitor for rapid successive requests to the /member/pet/detailV2 endpoint with varying pet IDs
- Enable alerting on access attempts to resources outside a user's authorized scope
Monitoring Recommendations
- Audit API access logs for the /member/pet/detailV2 endpoint regularly
- Establish baseline metrics for normal user behavior and alert on deviations
- Implement real-time monitoring for IDOR attack patterns across API endpoints
- Review authentication tokens and session activity for suspicious enumeration behavior
How to Mitigate CVE-2025-3660
Immediate Actions Required
- Upgrade Petlibro Smart Pet Feeder Platform beyond version 1.7.31 when a patched version becomes available
- Implement server-side authorization checks to verify the requesting user owns the requested pet resource
- Add rate limiting on the /member/pet/detailV2 endpoint to mitigate enumeration attacks
- Review access logs to identify any potential exploitation of this vulnerability
Patch Information
At the time of publication, vendor patch information is not available in the CVE data. Organizations should monitor the VulnCheck Advisory and BobDaHacker Blog Post for updates on remediation guidance from the vendor.
Workarounds
- Implement an API gateway or reverse proxy that enforces resource ownership validation before forwarding requests
- Deploy a web application firewall (WAF) with rules to detect and block parameter tampering and enumeration attempts
- Consider temporarily restricting access to the vulnerable endpoint until a patch is available
- Implement additional logging and monitoring to detect exploitation attempts while awaiting a permanent fix
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


