CVE-2025-1144: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in Quanxun School Affairs System
School Affairs System from Quanxun has an Exposure of Sensitive Information, allowing unauthenticated attackers to view specific pages and obtain database information as well as plaintext administrator credentials.
AI Analysis
Technical Summary
CVE-2025-1144 is a critical vulnerability identified in the Quanxun School Affairs System, which is a software product used for managing school administrative tasks. The vulnerability is classified under CWE-497, indicating an exposure of sensitive system information to an unauthorized control sphere. Specifically, this flaw allows unauthenticated attackers to access certain pages within the system and retrieve sensitive data, including database information and plaintext administrator credentials. The vulnerability has a CVSS 3.1 base score of 9.8, reflecting its critical severity. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it highly exploitable remotely. The impact affects confidentiality, integrity, and availability (C:H/I:H/A:H), meaning attackers can fully compromise the system by obtaining credentials and potentially manipulating or disrupting the system. No patches or mitigations have been published yet, and there are no known exploits in the wild at the time of reporting. The vulnerability's presence in version 0 of the product suggests it may affect initial or early releases of the software. The exposure of plaintext administrator credentials is particularly severe, as it can lead to complete system takeover, unauthorized data access, and further lateral movement within the affected environment.
Potential Impact
For European organizations, especially educational institutions using the Quanxun School Affairs System, this vulnerability poses a significant risk. Unauthorized access to administrator credentials can lead to full system compromise, exposing sensitive student and staff data, disrupting school operations, and potentially violating GDPR and other data protection regulations. The breach of confidentiality and integrity could result in data leaks, manipulation of academic records, and unauthorized changes to administrative settings. Availability impact could disrupt critical school functions, affecting teaching, grading, and communication. Given the criticality and ease of exploitation, attackers could leverage this vulnerability for espionage, ransomware deployment, or as a foothold for broader attacks within educational networks. The lack of authentication and user interaction requirements increases the likelihood of exploitation, making timely mitigation essential to protect European educational data and infrastructure.
Mitigation Recommendations
Immediate mitigation steps include isolating the affected system from public networks until a patch is available. Network-level controls such as firewall rules should restrict access to the School Affairs System to trusted IP ranges only. Implementing Web Application Firewalls (WAF) with custom rules to detect and block unauthorized access attempts to sensitive pages can reduce exposure. Organizations should conduct thorough credential audits and enforce password changes for all administrator accounts, assuming potential compromise. Monitoring and logging access to the system should be enhanced to detect suspicious activity promptly. If possible, deploy multi-factor authentication (MFA) on administrative accounts to mitigate risks from credential exposure. Vendors and users should prioritize obtaining and applying security patches once released. Additionally, conducting penetration testing and vulnerability assessments on the system can help identify other potential weaknesses. Educating staff about the risks and signs of compromise will further strengthen defense.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-1144: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in Quanxun School Affairs System
Description
School Affairs System from Quanxun has an Exposure of Sensitive Information, allowing unauthenticated attackers to view specific pages and obtain database information as well as plaintext administrator credentials.
AI-Powered Analysis
Technical Analysis
CVE-2025-1144 is a critical vulnerability identified in the Quanxun School Affairs System, which is a software product used for managing school administrative tasks. The vulnerability is classified under CWE-497, indicating an exposure of sensitive system information to an unauthorized control sphere. Specifically, this flaw allows unauthenticated attackers to access certain pages within the system and retrieve sensitive data, including database information and plaintext administrator credentials. The vulnerability has a CVSS 3.1 base score of 9.8, reflecting its critical severity. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it highly exploitable remotely. The impact affects confidentiality, integrity, and availability (C:H/I:H/A:H), meaning attackers can fully compromise the system by obtaining credentials and potentially manipulating or disrupting the system. No patches or mitigations have been published yet, and there are no known exploits in the wild at the time of reporting. The vulnerability's presence in version 0 of the product suggests it may affect initial or early releases of the software. The exposure of plaintext administrator credentials is particularly severe, as it can lead to complete system takeover, unauthorized data access, and further lateral movement within the affected environment.
Potential Impact
For European organizations, especially educational institutions using the Quanxun School Affairs System, this vulnerability poses a significant risk. Unauthorized access to administrator credentials can lead to full system compromise, exposing sensitive student and staff data, disrupting school operations, and potentially violating GDPR and other data protection regulations. The breach of confidentiality and integrity could result in data leaks, manipulation of academic records, and unauthorized changes to administrative settings. Availability impact could disrupt critical school functions, affecting teaching, grading, and communication. Given the criticality and ease of exploitation, attackers could leverage this vulnerability for espionage, ransomware deployment, or as a foothold for broader attacks within educational networks. The lack of authentication and user interaction requirements increases the likelihood of exploitation, making timely mitigation essential to protect European educational data and infrastructure.
Mitigation Recommendations
Immediate mitigation steps include isolating the affected system from public networks until a patch is available. Network-level controls such as firewall rules should restrict access to the School Affairs System to trusted IP ranges only. Implementing Web Application Firewalls (WAF) with custom rules to detect and block unauthorized access attempts to sensitive pages can reduce exposure. Organizations should conduct thorough credential audits and enforce password changes for all administrator accounts, assuming potential compromise. Monitoring and logging access to the system should be enhanced to detect suspicious activity promptly. If possible, deploy multi-factor authentication (MFA) on administrative accounts to mitigate risks from credential exposure. Vendors and users should prioritize obtaining and applying security patches once released. Additionally, conducting penetration testing and vulnerability assessments on the system can help identify other potential weaknesses. Educating staff about the risks and signs of compromise will further strengthen defense.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- twcert
- Date Reserved
- 2025-02-10T01:51:07.503Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ae12eaad5a09ad005b319c
Added to database: 8/26/2025, 8:02:50 PM
Last enriched: 8/26/2025, 8:18:00 PM
Last updated: 8/27/2025, 12:34:24 AM
Views: 4
Related Threats
CVE-2025-9514: Weak Password Requirements in macrozheng mall
MediumCVE-2025-9513: Inadequate Encryption Strength in editso fuso
MediumCVE-2025-9511: SQL Injection in itsourcecode Apartment Management System
MediumCVE-2025-57797: Incorrect privilege assignment in PFU Limited ScanSnap Manager installers
HighCVE-2025-57846: Incorrect default permissions in Digital Arts Inc. i-フィルター 6.0
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.