Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11080: Improper Authorization in zhuimengshaonian wisdom-education

0
Medium
VulnerabilityCVE-2025-11080cvecve-2025-11080
Published: Sat Sep 27 2025 (09/27/2025, 21:32:06 UTC)
Source: CVE Database V5
Vendor/Project: zhuimengshaonian
Product: wisdom-education

Description

A security vulnerability has been detected in zhuimengshaonian wisdom-education up to 1.0.4. This vulnerability affects the function selectStudentExamInfoList of the file src/main/java/com/education/api/controller/student/ExamInfoController.java. Such manipulation of the argument subjectId leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

AILast updated: 10/05/2025, 00:47:40 UTC

Technical Analysis

CVE-2025-11080 is a medium severity security vulnerability identified in the zhuimengshaonian wisdom-education software versions up to 1.0.4. The vulnerability exists in the selectStudentExamInfoList function within the ExamInfoController.java source file. Specifically, improper authorization occurs due to insufficient validation or control over the subjectId parameter passed to this function. This flaw allows an attacker to manipulate the subjectId argument remotely without requiring user interaction or elevated privileges beyond low-level privileges (PR:L). The vulnerability does not require authentication (AT:N) and can be exploited over the network (AV:N) with low attack complexity (AC:L). The impact primarily affects the confidentiality of data (VC:L), with no direct impact on integrity or availability. Although no known exploits are currently observed in the wild, the exploit details have been publicly disclosed, increasing the risk of exploitation. The vulnerability arises from a failure to enforce proper authorization checks on the subjectId parameter, potentially allowing unauthorized access to student exam information that should be restricted. This could lead to unauthorized disclosure of sensitive educational data, including exam results or student-specific information. The vulnerability is present in multiple early versions of the product (1.0.0 through 1.0.4), indicating that organizations using these versions are at risk until patches or mitigations are applied. The CVSS 4.0 score of 5.3 reflects a medium severity, balancing the ease of exploitation with limited impact scope and confidentiality impact only.

Potential Impact

For European organizations using the zhuimengshaonian wisdom-education platform, this vulnerability poses a risk of unauthorized disclosure of sensitive student exam information. Educational institutions, training centers, and e-learning providers relying on this software could face data breaches exposing personal and academic records. Such exposure may lead to violations of data protection regulations like the GDPR, resulting in legal and financial penalties. Furthermore, unauthorized access to exam data could undermine the integrity of educational assessments and damage institutional reputations. Although the vulnerability does not directly affect system availability or data integrity, the confidentiality breach alone can have significant consequences in the education sector. The remote exploitability without user interaction increases the risk of automated attacks or scanning by malicious actors. Organizations may also face indirect impacts such as loss of trust from students, parents, and regulatory bodies. Given the public disclosure of the exploit, the window for attackers to develop weaponized exploits is open, increasing urgency for mitigation.

Mitigation Recommendations

1. Immediate upgrade to a patched version of the zhuimengshaonian wisdom-education software once available from the vendor is the most effective mitigation. If patches are not yet released, implement strict access controls at the network level to restrict access to the affected API endpoints, especially the selectStudentExamInfoList function. 2. Employ web application firewalls (WAFs) with custom rules to detect and block abnormal or unauthorized requests manipulating the subjectId parameter. 3. Conduct thorough code reviews and implement additional authorization checks validating that the requesting user has permission to access the requested subjectId data. 4. Monitor logs for unusual access patterns or repeated requests targeting the vulnerable function to detect potential exploitation attempts. 5. Educate development teams on secure coding practices to prevent improper authorization issues in future releases. 6. If possible, implement multi-factor authentication and role-based access control (RBAC) to limit exposure of sensitive endpoints. 7. Coordinate with the vendor for timely security advisories and updates. 8. Prepare incident response plans to quickly address any detected exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-26T13:11:04.929Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d859aee2b9752dec525354

Added to database: 9/27/2025, 9:39:58 PM

Last enriched: 10/5/2025, 12:47:40 AM

Last updated: 11/11/2025, 2:24:49 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats