CVE-2025-40660 Overview
An Insecure Direct Object Reference (IDOR) vulnerability has been discovered in DM Corporative CMS. This vulnerability allows an unauthenticated attacker to access private administrative areas by manipulating the option parameter in the /administer/select node/data.asp endpoint. By setting the option parameter to values 0, 1, or 2, attackers can bypass access controls and gain unauthorized access to restricted content and functionality.
Critical Impact
Unauthorized access to private administrative areas in DM Corporative CMS through parameter manipulation, potentially exposing sensitive data and administrative functions to unauthenticated attackers.
Affected Products
- DM Corporative CMS (all versions)
- ACC DM Corporative CMS web applications
- DM Corporative CMS DMacroweb deployments
Discovery Timeline
- June 10, 2025 - CVE-2025-40660 published to NVD
- October 22, 2025 - Last updated in NVD database
Technical Details for CVE-2025-40660
Vulnerability Analysis
This IDOR vulnerability (CWE-639: Authorization Bypass Through User-Controlled Key) exists in the DM Corporative CMS web application. The core issue lies in the application's failure to properly validate user authorization when accessing the data retrieval endpoint. The vulnerable endpoint /administer/select node/data.asp accepts multiple parameters including mode, id1, id2, session, cod, networks, and critically, the option parameter.
The application does not adequately verify whether the requesting user has appropriate permissions to access the resources controlled by the option parameter. This allows attackers to enumerate through possible values (0, 1, or 2) to access different private areas of the application without proper authentication or authorization.
Root Cause
The root cause of this vulnerability is insufficient authorization checks on the server-side when processing requests to the administrative data endpoint. The application relies on client-supplied parameters to determine access levels without validating that the requesting user has legitimate privileges to access those resources. This is a classic IDOR vulnerability where object references (in this case, the option parameter) are exposed to users and can be manipulated to access unauthorized data.
Attack Vector
The attack vector for CVE-2025-40660 is network-based and requires no authentication or user interaction. An attacker can exploit this vulnerability by:
- Identifying the vulnerable endpoint at /administer/select node/data.asp
- Crafting a malicious request with the option parameter set to 0, 1, or 2
- Including additional required parameters such as mode=catalogue, id1=1, id2=1, cod=1, and networks=0
- Sending the crafted request directly to the server to access private administrative areas
The vulnerable URL pattern follows this structure:
/administer/select node/data.asp?mode=catalogue&id1=1&id2=1&session=&cod=1&networks=0&option=[0|1|2]
This allows unauthenticated remote attackers to bypass access controls and retrieve sensitive information from the private areas of the CMS.
Detection Methods for CVE-2025-40660
Indicators of Compromise
- Unusual access patterns to /administer/select node/data.asp from unauthenticated sessions
- Multiple requests to the data endpoint with varying option parameter values (0, 1, 2)
- Access to administrative endpoints from unexpected IP addresses or user agents
- Spike in requests to administrative paths without corresponding authentication events
Detection Strategies
- Implement web application firewall (WAF) rules to monitor and alert on direct access attempts to /administer/ endpoints without valid session authentication
- Configure intrusion detection systems to flag requests containing parameter enumeration patterns targeting the option parameter
- Review web server access logs for requests to data.asp with suspicious parameter combinations
- Deploy application-layer monitoring to detect unauthorized access attempts to administrative functions
Monitoring Recommendations
- Enable detailed logging for all requests to the /administer/ directory structure
- Set up alerts for failed or unauthorized access attempts to administrative endpoints
- Monitor for sequential or enumerated parameter values in request logs
- Implement session monitoring to correlate administrative access with valid authentication events
How to Mitigate CVE-2025-40660
Immediate Actions Required
- Restrict access to the /administer/ directory at the web server level using IP allowlisting or authentication requirements
- Implement server-side authorization checks for all requests to administrative endpoints
- Review and audit access logs for evidence of exploitation attempts
- Consider taking the affected CMS offline until proper access controls can be implemented
Patch Information
Consult the INCIBE Security Notice for the latest information regarding patches and remediation guidance from the vendor. Organizations should contact ACC directly for official patch availability and update instructions for DM Corporative CMS.
Workarounds
- Implement web server access controls (.htaccess or IIS URL Authorization) to require authentication before accessing any administrative paths
- Deploy a web application firewall (WAF) with rules to block unauthorized access to administrative endpoints
- Use network segmentation to restrict administrative interface access to trusted internal networks only
- Implement IP-based access restrictions for administrative functions as a temporary measure
# Example Apache .htaccess configuration to restrict admin access
<Directory "/path/to/webroot/administer">
AuthType Basic
AuthName "Restricted Access"
AuthUserFile /etc/apache2/.htpasswd
Require valid-user
# Optional: Additional IP restriction
# Require ip 192.168.1.0/24
</Directory>
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

