CVE-2025-13250: Improper Access Controls in WeiYe-Jing datax-web
A vulnerability was detected in WeiYe-Jing datax-web up to 2.1.2. This impacts the function remove/update/pause/start/triggerJob of the component Job Handler. Performing manipulation results in improper access controls. The attack may be initiated remotely. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2025-13250 is a vulnerability identified in WeiYe-Jing's datax-web product, specifically affecting versions 2.1.0 through 2.1.2. The flaw resides in the Job Handler component, which manages job lifecycle functions such as remove, update, pause, start, and triggerJob. Due to improper access control mechanisms, attackers with limited privileges can remotely invoke these functions without proper authorization, leading to unauthorized manipulation of scheduled jobs. This can compromise the integrity and availability of job execution workflows, potentially disrupting automated processes or causing unintended job executions or cancellations. The vulnerability is exploitable remotely over the network without requiring user interaction or elevated privileges beyond limited access, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no exploits have been observed in the wild yet, the public availability of exploit information raises the likelihood of future exploitation. The absence of vendor patches at the time of disclosure necessitates immediate compensating controls to mitigate risk. This vulnerability is particularly concerning for environments relying heavily on datax-web for job scheduling and automation, where unauthorized job manipulation could lead to operational disruptions or data inconsistencies.
Potential Impact
For European organizations, the improper access control vulnerability in datax-web could lead to unauthorized manipulation of critical job scheduling functions, impacting business continuity and operational integrity. Attackers could remotely pause, start, update, or remove jobs, potentially disrupting automated workflows, delaying critical data processing, or triggering unintended actions. This may result in data integrity issues, operational downtime, or cascading failures in dependent systems. Organizations in sectors such as finance, manufacturing, telecommunications, and public services that rely on automated job management are particularly vulnerable. The medium CVSS score reflects moderate risk, but the ease of remote exploitation without user interaction increases the threat level. Additionally, the public availability of exploit details may accelerate attack attempts, increasing the urgency for European entities to address this vulnerability promptly. Failure to mitigate could lead to reputational damage, regulatory scrutiny under GDPR if data processing is affected, and financial losses due to operational disruptions.
Mitigation Recommendations
1. Apply official patches from WeiYe-Jing as soon as they become available to address the improper access control issue directly. 2. Until patches are released, restrict network access to the datax-web management interface using firewalls, VPNs, or network segmentation to limit exposure to trusted administrators only. 3. Implement strict role-based access controls (RBAC) within datax-web to ensure only authorized personnel can perform job management operations. 4. Enable detailed logging and monitoring of job handler activities to detect unauthorized attempts to manipulate jobs. 5. Conduct regular audits of job schedules and changes to identify suspicious or unauthorized modifications. 6. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous requests targeting job handler functions. 7. Educate system administrators about the vulnerability and the importance of promptly applying security updates and monitoring job management activities. 8. Consider deploying web application firewalls (WAF) with custom rules to block suspicious API calls related to job manipulation until patches are applied.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13250: Improper Access Controls in WeiYe-Jing datax-web
Description
A vulnerability was detected in WeiYe-Jing datax-web up to 2.1.2. This impacts the function remove/update/pause/start/triggerJob of the component Job Handler. Performing manipulation results in improper access controls. The attack may be initiated remotely. The exploit is now public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13250 is a vulnerability identified in WeiYe-Jing's datax-web product, specifically affecting versions 2.1.0 through 2.1.2. The flaw resides in the Job Handler component, which manages job lifecycle functions such as remove, update, pause, start, and triggerJob. Due to improper access control mechanisms, attackers with limited privileges can remotely invoke these functions without proper authorization, leading to unauthorized manipulation of scheduled jobs. This can compromise the integrity and availability of job execution workflows, potentially disrupting automated processes or causing unintended job executions or cancellations. The vulnerability is exploitable remotely over the network without requiring user interaction or elevated privileges beyond limited access, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no exploits have been observed in the wild yet, the public availability of exploit information raises the likelihood of future exploitation. The absence of vendor patches at the time of disclosure necessitates immediate compensating controls to mitigate risk. This vulnerability is particularly concerning for environments relying heavily on datax-web for job scheduling and automation, where unauthorized job manipulation could lead to operational disruptions or data inconsistencies.
Potential Impact
For European organizations, the improper access control vulnerability in datax-web could lead to unauthorized manipulation of critical job scheduling functions, impacting business continuity and operational integrity. Attackers could remotely pause, start, update, or remove jobs, potentially disrupting automated workflows, delaying critical data processing, or triggering unintended actions. This may result in data integrity issues, operational downtime, or cascading failures in dependent systems. Organizations in sectors such as finance, manufacturing, telecommunications, and public services that rely on automated job management are particularly vulnerable. The medium CVSS score reflects moderate risk, but the ease of remote exploitation without user interaction increases the threat level. Additionally, the public availability of exploit details may accelerate attack attempts, increasing the urgency for European entities to address this vulnerability promptly. Failure to mitigate could lead to reputational damage, regulatory scrutiny under GDPR if data processing is affected, and financial losses due to operational disruptions.
Mitigation Recommendations
1. Apply official patches from WeiYe-Jing as soon as they become available to address the improper access control issue directly. 2. Until patches are released, restrict network access to the datax-web management interface using firewalls, VPNs, or network segmentation to limit exposure to trusted administrators only. 3. Implement strict role-based access controls (RBAC) within datax-web to ensure only authorized personnel can perform job management operations. 4. Enable detailed logging and monitoring of job handler activities to detect unauthorized attempts to manipulate jobs. 5. Conduct regular audits of job schedules and changes to identify suspicious or unauthorized modifications. 6. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous requests targeting job handler functions. 7. Educate system administrators about the vulnerability and the importance of promptly applying security updates and monitoring job management activities. 8. Consider deploying web application firewalls (WAF) with custom rules to block suspicious API calls related to job manipulation until patches are applied.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-15T15:04:42.385Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6919c1b3f176205dc4fad9dd
Added to database: 11/16/2025, 12:21:07 PM
Last enriched: 11/16/2025, 12:26:02 PM
Last updated: 11/16/2025, 3:06:16 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13251: SQL Injection in WeiYe-Jing datax-web
MediumCVE-2025-13249: Unrestricted Upload in Jiusi OA
MediumCVE-2025-13248: SQL Injection in SourceCodester Patients Waiting Area Queue Management System
MediumCVE-2025-13247: SQL Injection in PHPGurukul Tourism Management System
MediumCVE-2025-13246: Path Traversal in shsuishang ShopSuite ModulithShop
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.