Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11406: Information Disclosure in kaifangqian kaifangqian-base

0
Medium
VulnerabilityCVE-2025-11406cvecve-2025-11406
Published: Tue Oct 07 2025 (10/07/2025, 19:32:07 UTC)
Source: CVE Database V5
Vendor/Project: kaifangqian
Product: kaifangqian-base

Description

A security flaw has been discovered in kaifangqian kaifangqian-base up to 7b3faecda13848b3ced6c17c7423b76c5b47b8ab. This issue affects the function getAllUsers of the file kaifangqian-parent/kaifangqian-system/src/main/java/com/kaifangqian/modules/system/controller/SysUserController.java. The manipulation results in information disclosure. The attack can be launched remotely. The exploit has been released to the public and may be exploited. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.

AI-Powered Analysis

AILast updated: 10/07/2025, 20:01:23 UTC

Technical Analysis

CVE-2025-11406 is an information disclosure vulnerability found in the kaifangqian-base software, specifically in the getAllUsers function within the SysUserController.java file. This flaw allows remote attackers to retrieve sensitive user information by exploiting the function without requiring authentication or user interaction. The vulnerability arises from improper access control or insufficient validation in the getAllUsers method, which exposes user data that should be protected. The attack vector is network-based with low complexity, meaning an attacker can remotely exploit the issue without needing special privileges or user involvement. The product does not use versioning, making it difficult to determine which deployments are affected beyond the identified commit hash. Although no active exploitation in the wild is reported, the public availability of exploit code increases the likelihood of attacks. The CVSS 4.0 score of 5.3 reflects a medium severity level, primarily due to the confidentiality impact and ease of exploitation. The vulnerability does not affect system integrity or availability, nor does it require user interaction, which simplifies exploitation. Organizations using kaifangqian-base should assess their exposure, as sensitive user data leakage can lead to privacy violations, compliance issues, and potential further attacks leveraging disclosed information.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of user data managed by kaifangqian-base. Unauthorized disclosure of user information can lead to privacy breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and potential secondary attacks such as phishing or credential stuffing. Sectors handling sensitive personal or corporate data, including finance, healthcare, and government, are particularly vulnerable. The ease of remote exploitation without authentication increases the threat level, as attackers can operate anonymously from anywhere. The lack of versioning complicates patch management and vulnerability tracking, potentially prolonging exposure. While the vulnerability does not directly impact system availability or integrity, the indirect consequences of data leakage can disrupt business operations and erode trust. European entities must consider the legal and operational ramifications of such information disclosure, especially under stringent data protection laws.

Mitigation Recommendations

1. Restrict network access to the getAllUsers endpoint by implementing firewall rules or network segmentation to limit exposure to trusted internal networks only. 2. Deploy web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable function. 3. Conduct thorough code reviews and implement proper access control checks in the getAllUsers method to ensure only authorized users can retrieve user data. 4. Monitor application logs and network traffic for unusual access patterns or repeated requests to the vulnerable endpoint. 5. If possible, upgrade or patch the kaifangqian-base software once a fix is available; in the meantime, consider disabling or restricting the vulnerable functionality. 6. Implement strong authentication and authorization mechanisms around user data endpoints to prevent unauthorized access. 7. Educate security teams about this vulnerability and the availability of public exploits to enhance detection and response readiness. 8. Maintain an inventory of all kaifangqian-base deployments to identify and prioritize remediation efforts effectively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-07T07:12:05.001Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e56dd5a677756fc9a02ce5

Added to database: 10/7/2025, 7:45:25 PM

Last enriched: 10/7/2025, 8:01:23 PM

Last updated: 10/9/2025, 4:26:16 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats