CVE-2025-11080: Improper Authorization in zhuimengshaonian wisdom-education
A security vulnerability has been detected in zhuimengshaonian wisdom-education up to 1.0.4. This vulnerability affects the function selectStudentExamInfoList of the file src/main/java/com/education/api/controller/student/ExamInfoController.java. Such manipulation of the argument subjectId leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.
AI Analysis
Technical Summary
CVE-2025-11080 is a medium severity security vulnerability identified in the zhuimengshaonian wisdom-education software versions up to 1.0.4. The vulnerability exists in the selectStudentExamInfoList function within the ExamInfoController.java source file. Specifically, improper authorization occurs due to insufficient validation or control over the subjectId parameter passed to this function. This flaw allows an attacker to manipulate the subjectId argument remotely without requiring user interaction or elevated privileges beyond low-level privileges (PR:L). The vulnerability does not require authentication (AT:N) and can be exploited over the network (AV:N) with low attack complexity (AC:L). The impact primarily affects the confidentiality of data (VC:L), with no direct impact on integrity or availability. Although no known exploits are currently observed in the wild, the exploit details have been publicly disclosed, increasing the risk of exploitation. The vulnerability arises from a failure to enforce proper authorization checks on the subjectId parameter, potentially allowing unauthorized access to student exam information that should be restricted. This could lead to unauthorized disclosure of sensitive educational data, including exam results or student-specific information. The vulnerability is present in multiple early versions of the product (1.0.0 through 1.0.4), indicating that organizations using these versions are at risk until patches or mitigations are applied. The CVSS 4.0 score of 5.3 reflects a medium severity, balancing the ease of exploitation with limited impact scope and confidentiality impact only.
Potential Impact
For European organizations using the zhuimengshaonian wisdom-education platform, this vulnerability poses a risk of unauthorized disclosure of sensitive student exam information. Educational institutions, training centers, and e-learning providers relying on this software could face data breaches exposing personal and academic records. Such exposure may lead to violations of data protection regulations like the GDPR, resulting in legal and financial penalties. Furthermore, unauthorized access to exam data could undermine the integrity of educational assessments and damage institutional reputations. Although the vulnerability does not directly affect system availability or data integrity, the confidentiality breach alone can have significant consequences in the education sector. The remote exploitability without user interaction increases the risk of automated attacks or scanning by malicious actors. Organizations may also face indirect impacts such as loss of trust from students, parents, and regulatory bodies. Given the public disclosure of the exploit, the window for attackers to develop weaponized exploits is open, increasing urgency for mitigation.
Mitigation Recommendations
1. Immediate upgrade to a patched version of the zhuimengshaonian wisdom-education software once available from the vendor is the most effective mitigation. If patches are not yet released, implement strict access controls at the network level to restrict access to the affected API endpoints, especially the selectStudentExamInfoList function. 2. Employ web application firewalls (WAFs) with custom rules to detect and block abnormal or unauthorized requests manipulating the subjectId parameter. 3. Conduct thorough code reviews and implement additional authorization checks validating that the requesting user has permission to access the requested subjectId data. 4. Monitor logs for unusual access patterns or repeated requests targeting the vulnerable function to detect potential exploitation attempts. 5. Educate development teams on secure coding practices to prevent improper authorization issues in future releases. 6. If possible, implement multi-factor authentication and role-based access control (RBAC) to limit exposure of sensitive endpoints. 7. Coordinate with the vendor for timely security advisories and updates. 8. Prepare incident response plans to quickly address any detected exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-11080: Improper Authorization in zhuimengshaonian wisdom-education
Description
A security vulnerability has been detected in zhuimengshaonian wisdom-education up to 1.0.4. This vulnerability affects the function selectStudentExamInfoList of the file src/main/java/com/education/api/controller/student/ExamInfoController.java. Such manipulation of the argument subjectId leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-11080 is a medium severity security vulnerability identified in the zhuimengshaonian wisdom-education software versions up to 1.0.4. The vulnerability exists in the selectStudentExamInfoList function within the ExamInfoController.java source file. Specifically, improper authorization occurs due to insufficient validation or control over the subjectId parameter passed to this function. This flaw allows an attacker to manipulate the subjectId argument remotely without requiring user interaction or elevated privileges beyond low-level privileges (PR:L). The vulnerability does not require authentication (AT:N) and can be exploited over the network (AV:N) with low attack complexity (AC:L). The impact primarily affects the confidentiality of data (VC:L), with no direct impact on integrity or availability. Although no known exploits are currently observed in the wild, the exploit details have been publicly disclosed, increasing the risk of exploitation. The vulnerability arises from a failure to enforce proper authorization checks on the subjectId parameter, potentially allowing unauthorized access to student exam information that should be restricted. This could lead to unauthorized disclosure of sensitive educational data, including exam results or student-specific information. The vulnerability is present in multiple early versions of the product (1.0.0 through 1.0.4), indicating that organizations using these versions are at risk until patches or mitigations are applied. The CVSS 4.0 score of 5.3 reflects a medium severity, balancing the ease of exploitation with limited impact scope and confidentiality impact only.
Potential Impact
For European organizations using the zhuimengshaonian wisdom-education platform, this vulnerability poses a risk of unauthorized disclosure of sensitive student exam information. Educational institutions, training centers, and e-learning providers relying on this software could face data breaches exposing personal and academic records. Such exposure may lead to violations of data protection regulations like the GDPR, resulting in legal and financial penalties. Furthermore, unauthorized access to exam data could undermine the integrity of educational assessments and damage institutional reputations. Although the vulnerability does not directly affect system availability or data integrity, the confidentiality breach alone can have significant consequences in the education sector. The remote exploitability without user interaction increases the risk of automated attacks or scanning by malicious actors. Organizations may also face indirect impacts such as loss of trust from students, parents, and regulatory bodies. Given the public disclosure of the exploit, the window for attackers to develop weaponized exploits is open, increasing urgency for mitigation.
Mitigation Recommendations
1. Immediate upgrade to a patched version of the zhuimengshaonian wisdom-education software once available from the vendor is the most effective mitigation. If patches are not yet released, implement strict access controls at the network level to restrict access to the affected API endpoints, especially the selectStudentExamInfoList function. 2. Employ web application firewalls (WAFs) with custom rules to detect and block abnormal or unauthorized requests manipulating the subjectId parameter. 3. Conduct thorough code reviews and implement additional authorization checks validating that the requesting user has permission to access the requested subjectId data. 4. Monitor logs for unusual access patterns or repeated requests targeting the vulnerable function to detect potential exploitation attempts. 5. Educate development teams on secure coding practices to prevent improper authorization issues in future releases. 6. If possible, implement multi-factor authentication and role-based access control (RBAC) to limit exposure of sensitive endpoints. 7. Coordinate with the vendor for timely security advisories and updates. 8. Prepare incident response plans to quickly address any detected exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-26T13:11:04.929Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d859aee2b9752dec525354
Added to database: 9/27/2025, 9:39:58 PM
Last enriched: 10/5/2025, 12:47:40 AM
Last updated: 11/11/2025, 2:24:49 AM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-42940: CWE-787: Out-of-bounds Write in SAP_SE SAP CommonCryptoLib
HighCVE-2025-42924: CWE-601: URL Redirection to Untrusted Site in SAP_SE SAP S/4HANA landscape (SAP E-Recruiting BSP)
MediumCVE-2025-42919: CWE-22: Improper Limitation of a Pathname to a Restricted Directory in SAP_SE SAP NetWeaver Application Server Java
MediumCVE-2025-42899: CWE-862: Missing Authorization in SAP_SE SAP S4CORE (Manage Journal Entries)
MediumCVE-2025-42897: CWE-522: Insufficiently Protected Credentials in SAP_SE SAP Business One (SLD)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.