CVE Alert: CVE-2025-2413 – Akinsoft – ProKuafor

CVE-2025-2413

HIGHNo exploitation known

Improper Restriction of Excessive Authentication Attempts vulnerability in Akinsoft ProKuafor allows Authentication Bypass.This issue affects ProKuafor: from s1.02.08 before v1.02.08.

CVSS v3.1 (8.6)
AV NETWORK · AC LOW · PR NONE · UI NONE · S UNCHANGED
Vendor
Akinsoft
Product
ProKuafor
Versions
s1.02.08 lt v1.02.08
CWE
CWE-307, CWE-307 Improper Restriction of Excessive Authentication Attempts
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
Published
2025-09-02T13:28:21.556Z
Updated
2025-09-02T14:00:41.976Z

AI Summary Analysis

Risk verdict

High risk: remote authentication bypass potential present; no confirmed exploitation signals in the latest ADP data, but patching should be treated with urgency.

Why this matters

If an attacker can bypass authentication remotely, they could access the ProKuafor ERP without valid credentials, enabling data access or manipulation. The combination of network vector and high confidentiality impact means even limited access can yield sensitive financial or customer data exposure and potential disruption to operations.

Most likely attack path

An attacker targets the login surface from the network, testing excessive authentication attempts until bypass occurs. With no privileges required and UI interactions not needed, successful bypass would grant unauthorised access and possible lateral movement within the ERP environment, particularly if shared authentication tokens or workflows span multiple modules.

Who is most exposed

Organisations hosting ProKuafor on‑premises or in hosted environments with internet-facing authentication endpoints are most at risk, especially small to mid-sized deployments with consolidated admin accounts and limited MFA enforcement.

Detection ideas

  • Spike in failed login attempts followed by successful access events
  • Repeated lockouts or unusual IPs/geolocations targeting the login endpoint
  • Unusual session creation after failed attempts or OTP-related anomalies
  • Correlation of login events with atypical account activity across modules
  • Audit logs showing OTP bypass signals or unexpected authentication flows

Mitigation and prioritisation

  • Apply patch to v1.02.08 or newer immediately where feasible
  • Enforce MFA on all login paths and implement strict login rate limits and account lockouts
  • Deploy network controls: IP allowlists, geo-blocking, and WAF rules for authentication endpoints
  • Perform credential hygiene: rotate admin/service accounts, review access scopes
  • Change-management: test in staging, coordinate with vendor, schedule minimal downtime
  • Prioritisation: treat as priority 1 if KEV is true or EPSS ≥ 0.5; otherwise monitor and remediate promptly.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.