Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10675: Improper Authorization in fuyang_lipengjun platform

0
Medium
VulnerabilityCVE-2025-10675cvecve-2025-10675
Published: Thu Sep 18 2025 (09/18/2025, 16:02:08 UTC)
Source: CVE Database V5
Vendor/Project: fuyang_lipengjun
Product: platform

Description

A security flaw has been discovered in fuyang_lipengjun platform 1.0. This impacts the function AttributeController of the file /attribute/queryAll. Performing manipulation results in improper authorization. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 09/26/2025, 00:55:44 UTC

Technical Analysis

CVE-2025-10675 is a medium-severity security vulnerability identified in version 1.0 of the fuyang_lipengjun platform. The flaw resides specifically in the AttributeController component, within the /attribute/queryAll endpoint. This vulnerability is characterized by improper authorization controls, allowing an attacker to manipulate requests to this function and bypass intended access restrictions. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The exploitability is rated as partially functional (E:P), meaning that exploit code is publicly available but may require some conditions or skill to execute effectively. The impact on confidentiality is low (VC:L), and there is no impact on integrity or availability, which aligns with the medium severity rating and a CVSS score of 5.3. The vulnerability does not require user interaction and can be exploited over the network with low attack complexity. Although no patches or fixes have been linked yet, the public disclosure of the exploit increases the risk of exploitation. The vulnerability could allow unauthorized access to potentially sensitive attributes or data managed by the platform, which could lead to information disclosure or unauthorized data access within affected deployments. Given the lack of authentication requirement and the remote nature of the exploit, this vulnerability poses a tangible risk to organizations using the affected platform version 1.0, especially if the platform is exposed to untrusted networks or the internet.

Potential Impact

For European organizations using the fuyang_lipengjun platform version 1.0, this vulnerability could lead to unauthorized access to sensitive attribute data managed by the platform. This may result in partial confidentiality breaches, potentially exposing business-critical or personal data. Although the vulnerability does not directly impact data integrity or system availability, unauthorized data access could facilitate further attacks or data leakage, undermining compliance with European data protection regulations such as GDPR. Organizations in sectors with strict data privacy requirements (e.g., finance, healthcare, public sector) could face regulatory and reputational consequences if exploited. The remote and unauthenticated nature of the vulnerability increases the risk of exploitation, especially in environments where the platform is accessible from external networks. The public availability of exploit code further elevates the threat level, necessitating prompt attention to mitigate potential breaches.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting external access to the /attribute/queryAll endpoint by implementing network-level controls such as firewalls or VPNs to limit access to trusted internal users only. 2. Implement strict access control and authorization checks at the application layer to ensure that only authorized users can invoke the AttributeController functions. This may involve reviewing and hardening role-based access control (RBAC) policies. 3. Monitor logs for unusual or unauthorized access attempts to the vulnerable endpoint to detect potential exploitation attempts early. 4. Engage with the vendor or development team to obtain or develop patches or updates addressing the improper authorization flaw. 5. If patching is not immediately possible, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block exploit attempts targeting the /attribute/queryAll endpoint. 6. Conduct a thorough security review of the platform’s authorization mechanisms to identify and remediate similar weaknesses. 7. Educate system administrators and security teams about the vulnerability and the importance of timely updates and monitoring.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-18T05:52:18.534Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cc2e5b84c3e40d9e1945e3

Added to database: 9/18/2025, 4:07:55 PM

Last enriched: 9/26/2025, 12:55:44 AM

Last updated: 10/31/2025, 10:17:58 AM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats