Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25953: n/a

0
Medium
VulnerabilityCVE-2025-25953cvecve-2025-25953
Published: Mon Mar 03 2025 (03/03/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR v1.0.118 was discovered to contain an Azure JWT access token exposure. This vulnerability allows authenticated attackers to escalate privileges and access sensitive information.

AI-Powered Analysis

AILast updated: 12/12/2025, 15:41:28 UTC

Technical Analysis

CVE-2025-25953 is a vulnerability identified in the Academia Student Information System (SIS) EagleR version 1.0.118 developed by Serosoft Solutions Pvt Ltd. The core issue is the exposure of Azure JSON Web Tokens (JWTs) used for access control. These tokens, if exposed, allow attackers who are already authenticated with some privileges to escalate their access rights, thereby gaining unauthorized access to sensitive information within the system. The vulnerability stems from improper authorization checks (CWE-862), meaning the system fails to adequately verify whether a user should have access to certain resources or tokens. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and demands that the attacker already has some privileges (PR:H). No user interaction is required (UI:N), and the scope remains unchanged (S:U). The impact on confidentiality and integrity is high (C:H/I:H), but availability is not affected (A:N). This vulnerability is significant because JWTs are bearer tokens that grant access to protected resources; their exposure can lead to unauthorized data disclosure and privilege escalation. Although no patches or exploits are currently known, the risk remains for organizations using this SIS version, particularly in educational environments where sensitive student data is stored and managed.

Potential Impact

For European organizations, especially educational institutions using the Academia SIS EagleR system, this vulnerability poses a serious risk to the confidentiality and integrity of student and institutional data. Unauthorized access could lead to exposure of personal identifiable information (PII), academic records, and potentially financial data. This could result in regulatory non-compliance with GDPR, reputational damage, and potential legal consequences. The ability to escalate privileges means attackers could manipulate records or gain further access to internal systems, increasing the risk of broader compromise. Since the vulnerability requires authenticated access, insider threats or compromised credentials could be leveraged to exploit this flaw. The lack of availability impact reduces the risk of service disruption but does not diminish the severity of data breaches. European organizations must consider the sensitivity of educational data and the regulatory environment, which mandates strict data protection controls.

Mitigation Recommendations

Organizations should immediately audit their use of the Academia SIS EagleR v1.0.118 system to identify if they are affected. Since no patches are currently available, interim mitigations include restricting access to the SIS system to trusted networks and users, enforcing strong authentication and credential hygiene to reduce the risk of compromised accounts, and monitoring for unusual access patterns indicative of privilege escalation attempts. Token handling should be reviewed to ensure Azure JWTs are not exposed in logs, URLs, or client-side storage. Implementing strict role-based access controls (RBAC) and least privilege principles will limit the damage potential if tokens are compromised. Additionally, organizations should prepare to deploy patches or updates from Serosoft Solutions promptly once released. Regular security assessments and penetration testing focusing on authorization controls can help detect similar weaknesses. Finally, educating staff about the risks of credential compromise and monitoring for insider threats will further reduce exploitation risk.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-02-07T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9847c4522896dcbf5565

Added to database: 5/21/2025, 9:09:27 AM

Last enriched: 12/12/2025, 3:41:28 PM

Last updated: 1/7/2026, 8:50:42 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats