CVE-2025-3113 PUBLISHED

Improper Access Control in Delphix Masking Engine

Assigner: Perforce
Reserved: 02.04.2025 Published: 17.04.2025 Updated: 17.04.2025

A valid, authenticated user with sufficient privileges and who is aware of Continuous Compliance’s internal database configurations can leverage the application’s built-in Connector functionality to access Continuous Compliance’s internal database. This allows the user to explore the internal database schema and export its data, including the properties of Connecters and Rule Sets.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CVSS Score: 9

Product Status

Vendor Perforce
Product Delphix
Versions Default: unaffected
  • affected from 0 to 2025.2.0.1 (excl.)

References

Problem Types

  • CWE-284 Improper Access Control CWE