CVE-2025-13250: Improper Access Controls in WeiYe-Jing datax-web
A vulnerability was detected in WeiYe-Jing datax-web up to 2.1.2. This impacts the function remove/update/pause/start/triggerJob of the component Job Handler. Performing manipulation results in improper access controls. The attack may be initiated remotely. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2025-13250 is an improper access control vulnerability found in the WeiYe-Jing datax-web product, specifically affecting versions 2.1.0 through 2.1.2. The flaw resides in the Job Handler component, which manages job lifecycle functions such as remove, update, pause, start, and triggerJob. Due to insufficient access control checks, an attacker with limited privileges can remotely invoke these functions without proper authorization, potentially manipulating job execution workflows. The vulnerability is exploitable over the network without requiring user interaction or elevated privileges beyond limited access, making it relatively easy to exploit in environments where the datax-web interface is exposed or accessible internally. The improper access control can lead to unauthorized job modifications, causing disruption of scheduled tasks, data integrity issues, or denial of service conditions if critical jobs are paused or removed. Although no public patches are currently linked, the vulnerability is published with a CVSS 4.0 base score of 5.3, indicating medium severity. The exploit code is publicly available, increasing the likelihood of exploitation. The vulnerability does not affect system confidentiality or availability at a critical level but poses a significant risk to the integrity and availability of job management processes. Organizations relying on datax-web for automated job scheduling and execution should prioritize mitigation to prevent operational impact.
Potential Impact
For European organizations, exploitation of CVE-2025-13250 could result in unauthorized manipulation of job scheduling and execution, leading to operational disruptions, data processing errors, or denial of service in critical workflows. Industries relying heavily on automated job management, such as finance, manufacturing, telecommunications, and public services, may experience degraded service availability or data integrity issues. The vulnerability could be leveraged to disrupt business continuity or sabotage automated processes. Since the attack can be initiated remotely with limited privileges, organizations with exposed or poorly segmented datax-web interfaces are at higher risk. The impact extends to compliance risks if job manipulations affect data processing governed by regulations like GDPR. Additionally, the availability of public exploit code increases the threat landscape, necessitating urgent attention to prevent potential targeted attacks or opportunistic exploitation within European networks.
Mitigation Recommendations
1. Monitor WeiYe-Jing vendor channels closely for official patches addressing CVE-2025-13250 and apply them promptly once available. 2. Restrict network access to the datax-web Job Handler interface using firewall rules, VPNs, or zero-trust segmentation to limit exposure to trusted users and systems only. 3. Implement strong authentication and authorization controls around job management functions, ensuring that only authorized personnel can invoke sensitive job operations. 4. Conduct regular audits and monitoring of job execution logs to detect unauthorized or anomalous job manipulation activities. 5. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting job handler endpoints. 6. Isolate datax-web instances in secure network zones with minimal exposure to external networks. 7. Educate administrators and users on the risks of improper access controls and enforce the principle of least privilege for job management roles. 8. Consider temporary disabling or limiting job handler functionalities if immediate patching is not feasible, balancing operational needs and security.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13250: Improper Access Controls in WeiYe-Jing datax-web
Description
A vulnerability was detected in WeiYe-Jing datax-web up to 2.1.2. This impacts the function remove/update/pause/start/triggerJob of the component Job Handler. Performing manipulation results in improper access controls. The attack may be initiated remotely. The exploit is now public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13250 is an improper access control vulnerability found in the WeiYe-Jing datax-web product, specifically affecting versions 2.1.0 through 2.1.2. The flaw resides in the Job Handler component, which manages job lifecycle functions such as remove, update, pause, start, and triggerJob. Due to insufficient access control checks, an attacker with limited privileges can remotely invoke these functions without proper authorization, potentially manipulating job execution workflows. The vulnerability is exploitable over the network without requiring user interaction or elevated privileges beyond limited access, making it relatively easy to exploit in environments where the datax-web interface is exposed or accessible internally. The improper access control can lead to unauthorized job modifications, causing disruption of scheduled tasks, data integrity issues, or denial of service conditions if critical jobs are paused or removed. Although no public patches are currently linked, the vulnerability is published with a CVSS 4.0 base score of 5.3, indicating medium severity. The exploit code is publicly available, increasing the likelihood of exploitation. The vulnerability does not affect system confidentiality or availability at a critical level but poses a significant risk to the integrity and availability of job management processes. Organizations relying on datax-web for automated job scheduling and execution should prioritize mitigation to prevent operational impact.
Potential Impact
For European organizations, exploitation of CVE-2025-13250 could result in unauthorized manipulation of job scheduling and execution, leading to operational disruptions, data processing errors, or denial of service in critical workflows. Industries relying heavily on automated job management, such as finance, manufacturing, telecommunications, and public services, may experience degraded service availability or data integrity issues. The vulnerability could be leveraged to disrupt business continuity or sabotage automated processes. Since the attack can be initiated remotely with limited privileges, organizations with exposed or poorly segmented datax-web interfaces are at higher risk. The impact extends to compliance risks if job manipulations affect data processing governed by regulations like GDPR. Additionally, the availability of public exploit code increases the threat landscape, necessitating urgent attention to prevent potential targeted attacks or opportunistic exploitation within European networks.
Mitigation Recommendations
1. Monitor WeiYe-Jing vendor channels closely for official patches addressing CVE-2025-13250 and apply them promptly once available. 2. Restrict network access to the datax-web Job Handler interface using firewall rules, VPNs, or zero-trust segmentation to limit exposure to trusted users and systems only. 3. Implement strong authentication and authorization controls around job management functions, ensuring that only authorized personnel can invoke sensitive job operations. 4. Conduct regular audits and monitoring of job execution logs to detect unauthorized or anomalous job manipulation activities. 5. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting job handler endpoints. 6. Isolate datax-web instances in secure network zones with minimal exposure to external networks. 7. Educate administrators and users on the risks of improper access controls and enforce the principle of least privilege for job management roles. 8. Consider temporary disabling or limiting job handler functionalities if immediate patching is not feasible, balancing operational needs and security.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-15T15:04:42.385Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6919c1b3f176205dc4fad9dd
Added to database: 11/16/2025, 12:21:07 PM
Last enriched: 11/23/2025, 1:02:29 PM
Last updated: 1/7/2026, 8:49:18 AM
Views: 79
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.