
Cloud Vulnerability DB
A community-led vulnerabilities database
A Missing Authorization vulnerability (CVE-2025-57907) was discovered in Heureka Group's Heureka plugin versions through 1.1.0. The vulnerability was disclosed on September 22, 2025, and allows unauthorized access to functionality not properly constrained by Access Control Lists (ACLs) (Patchstack).
The vulnerability is classified as a Broken Access Control issue (CWE-862) with a CVSS v3.1 Base Score of 5.3 (Medium). The attack vector is network-based (AV:N), requires low attack complexity (AC:L), needs no privileges (PR:N), requires no user interaction (UI:N), has unchanged scope (S:U), with no impact on confidentiality (C:N), low impact on integrity (I:L), and no impact on availability (A:N) (Patchstack).
The vulnerability allows unprivileged users to execute certain higher privileged actions due to missing authorization checks. The impact is primarily on the integrity of the system, though specific impacts may vary case by case (Patchstack).
No official fix is available as the software appears to be abandoned, having not received updates for over a year. The recommended mitigation is to remove and replace the Heureka plugin with an alternative solution. Note that merely deactivating the plugin does not remove the security threat (Patchstack).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."