Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13250: Improper Access Controls in WeiYe-Jing datax-web

0
Medium
VulnerabilityCVE-2025-13250cvecve-2025-13250
Published: Sun Nov 16 2025 (11/16/2025, 12:02:05 UTC)
Source: CVE Database V5
Vendor/Project: WeiYe-Jing
Product: datax-web

Description

A vulnerability was detected in WeiYe-Jing datax-web up to 2.1.2. This impacts the function remove/update/pause/start/triggerJob of the component Job Handler. Performing manipulation results in improper access controls. The attack may be initiated remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 11/23/2025, 13:02:29 UTC

Technical Analysis

CVE-2025-13250 is an improper access control vulnerability found in the WeiYe-Jing datax-web product, specifically affecting versions 2.1.0 through 2.1.2. The flaw resides in the Job Handler component, which manages job lifecycle functions such as remove, update, pause, start, and triggerJob. Due to insufficient access control checks, an attacker with limited privileges can remotely invoke these functions without proper authorization, potentially manipulating job execution workflows. The vulnerability is exploitable over the network without requiring user interaction or elevated privileges beyond limited access, making it relatively easy to exploit in environments where the datax-web interface is exposed or accessible internally. The improper access control can lead to unauthorized job modifications, causing disruption of scheduled tasks, data integrity issues, or denial of service conditions if critical jobs are paused or removed. Although no public patches are currently linked, the vulnerability is published with a CVSS 4.0 base score of 5.3, indicating medium severity. The exploit code is publicly available, increasing the likelihood of exploitation. The vulnerability does not affect system confidentiality or availability at a critical level but poses a significant risk to the integrity and availability of job management processes. Organizations relying on datax-web for automated job scheduling and execution should prioritize mitigation to prevent operational impact.

Potential Impact

For European organizations, exploitation of CVE-2025-13250 could result in unauthorized manipulation of job scheduling and execution, leading to operational disruptions, data processing errors, or denial of service in critical workflows. Industries relying heavily on automated job management, such as finance, manufacturing, telecommunications, and public services, may experience degraded service availability or data integrity issues. The vulnerability could be leveraged to disrupt business continuity or sabotage automated processes. Since the attack can be initiated remotely with limited privileges, organizations with exposed or poorly segmented datax-web interfaces are at higher risk. The impact extends to compliance risks if job manipulations affect data processing governed by regulations like GDPR. Additionally, the availability of public exploit code increases the threat landscape, necessitating urgent attention to prevent potential targeted attacks or opportunistic exploitation within European networks.

Mitigation Recommendations

1. Monitor WeiYe-Jing vendor channels closely for official patches addressing CVE-2025-13250 and apply them promptly once available. 2. Restrict network access to the datax-web Job Handler interface using firewall rules, VPNs, or zero-trust segmentation to limit exposure to trusted users and systems only. 3. Implement strong authentication and authorization controls around job management functions, ensuring that only authorized personnel can invoke sensitive job operations. 4. Conduct regular audits and monitoring of job execution logs to detect unauthorized or anomalous job manipulation activities. 5. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting job handler endpoints. 6. Isolate datax-web instances in secure network zones with minimal exposure to external networks. 7. Educate administrators and users on the risks of improper access controls and enforce the principle of least privilege for job management roles. 8. Consider temporary disabling or limiting job handler functionalities if immediate patching is not feasible, balancing operational needs and security.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-15T15:04:42.385Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6919c1b3f176205dc4fad9dd

Added to database: 11/16/2025, 12:21:07 PM

Last enriched: 11/23/2025, 1:02:29 PM

Last updated: 1/7/2026, 8:49:18 AM

Views: 79

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats