In TIM BPM Suite/ TIM FLOW through 9.1.2 multiple Authorization Bypass vulnerabilities exists which allow a low privileged user to download password hashes of other user, access work items of other user, modify restricted content in workflows, modify the applications logo and manipulate the profile of other user.
History

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
First Time appeared Tim-solutions
Tim-solutions tim Flow
CPEs cpe:2.3:a:tim-solutions:tim_flow:*:*:*:*:*:*:*:*
Vendors & Products Tim-solutions
Tim-solutions tim Flow

Fri, 09 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-288
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 09 Jan 2026 16:00:00 +0000

Type Values Removed Values Added
Description In TIM BPM Suite/ TIM FLOW through 9.1.2 multiple Authorization Bypass vulnerabilities exists which allow a low privileged user to download password hashes of other user, access work items of other user, modify restricted content in workflows, modify the applications logo and manipulate the profile of other user.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2026-01-09T00:00:00.000Z

Updated: 2026-01-09T16:10:18.983Z

Reserved: 2025-12-08T00:00:00.000Z

Link: CVE-2025-67282

cve-icon Vulnrichment

Updated: 2026-01-09T16:10:14.084Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-09T16:16:07.623

Modified: 2026-01-22T21:32:26.063

Link: CVE-2025-67282

cve-icon Redhat

No data.