CVE-2025-5522: Improper Authorization in jack0240 魏 bskms 蓝天幼儿园管理系统
A vulnerability was found in jack0240 魏 bskms 蓝天幼儿园管理系统 up to dffe6640b5b54d8e29da6f060e0493fea74b3fad. It has been rated as critical. Affected by this issue is some unknown functionality of the file /sa/addUser of the component User Creation Handler. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.
AI Analysis
Technical Summary
CVE-2025-5522 is a critical improper authorization vulnerability identified in the jack0240 魏 bskms 蓝天幼儿园管理系统, a kindergarten management system. The flaw exists in the User Creation Handler component, specifically within the /sa/addUser endpoint. This vulnerability allows an unauthenticated remote attacker to manipulate the user creation process without proper authorization checks. The improper authorization means that the system fails to verify whether the requester has the necessary privileges to add new users, potentially allowing unauthorized account creation. Given that the product uses continuous delivery with rolling releases, specific version details for affected or patched releases are not clearly defined, complicating patch management. The CVSS 4.0 base score is 6.9 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and impacts on confidentiality, integrity, and availability at a low level. Although no known exploits are currently observed in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The vulnerability could lead to unauthorized access, privilege escalation, and potential lateral movement within affected environments, undermining the security posture of organizations using this system.
Potential Impact
For European organizations, especially those operating kindergartens or educational institutions using the bskms 蓝天幼儿园管理系统, this vulnerability poses a significant risk. Unauthorized user creation can lead to unauthorized access to sensitive personal data of children, staff, and parents, violating GDPR and other data protection regulations. Attackers could create accounts with elevated privileges, enabling data exfiltration, manipulation of records, or disruption of services. This could result in reputational damage, regulatory fines, and operational disruptions. Given the critical nature of educational data and the trust placed in these systems, exploitation could severely impact confidentiality and integrity. Additionally, unauthorized accounts could be used as footholds for further attacks within the organization's network. The medium CVSS score suggests moderate but tangible risk, emphasizing the need for prompt mitigation to prevent escalation.
Mitigation Recommendations
Organizations should immediately audit and monitor the /sa/addUser endpoint for unauthorized access attempts. Since no official patches or version details are available due to continuous delivery, it is critical to implement compensating controls such as network-level restrictions limiting access to the management interface to trusted IPs only. Employ Web Application Firewalls (WAFs) with rules to detect and block anomalous user creation requests. Conduct thorough access reviews and enforce multi-factor authentication (MFA) on administrative interfaces to reduce risk if unauthorized accounts are created. Implement detailed logging and alerting on user creation activities to detect suspicious behavior promptly. Engage with the vendor for timely updates or patches and test any new releases rigorously before deployment. Additionally, consider isolating the management system within a segmented network zone to limit potential lateral movement in case of compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-5522: Improper Authorization in jack0240 魏 bskms 蓝天幼儿园管理系统
Description
A vulnerability was found in jack0240 魏 bskms 蓝天幼儿园管理系统 up to dffe6640b5b54d8e29da6f060e0493fea74b3fad. It has been rated as critical. Affected by this issue is some unknown functionality of the file /sa/addUser of the component User Creation Handler. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.
AI-Powered Analysis
Technical Analysis
CVE-2025-5522 is a critical improper authorization vulnerability identified in the jack0240 魏 bskms 蓝天幼儿园管理系统, a kindergarten management system. The flaw exists in the User Creation Handler component, specifically within the /sa/addUser endpoint. This vulnerability allows an unauthenticated remote attacker to manipulate the user creation process without proper authorization checks. The improper authorization means that the system fails to verify whether the requester has the necessary privileges to add new users, potentially allowing unauthorized account creation. Given that the product uses continuous delivery with rolling releases, specific version details for affected or patched releases are not clearly defined, complicating patch management. The CVSS 4.0 base score is 6.9 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and impacts on confidentiality, integrity, and availability at a low level. Although no known exploits are currently observed in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The vulnerability could lead to unauthorized access, privilege escalation, and potential lateral movement within affected environments, undermining the security posture of organizations using this system.
Potential Impact
For European organizations, especially those operating kindergartens or educational institutions using the bskms 蓝天幼儿园管理系统, this vulnerability poses a significant risk. Unauthorized user creation can lead to unauthorized access to sensitive personal data of children, staff, and parents, violating GDPR and other data protection regulations. Attackers could create accounts with elevated privileges, enabling data exfiltration, manipulation of records, or disruption of services. This could result in reputational damage, regulatory fines, and operational disruptions. Given the critical nature of educational data and the trust placed in these systems, exploitation could severely impact confidentiality and integrity. Additionally, unauthorized accounts could be used as footholds for further attacks within the organization's network. The medium CVSS score suggests moderate but tangible risk, emphasizing the need for prompt mitigation to prevent escalation.
Mitigation Recommendations
Organizations should immediately audit and monitor the /sa/addUser endpoint for unauthorized access attempts. Since no official patches or version details are available due to continuous delivery, it is critical to implement compensating controls such as network-level restrictions limiting access to the management interface to trusted IPs only. Employ Web Application Firewalls (WAFs) with rules to detect and block anomalous user creation requests. Conduct thorough access reviews and enforce multi-factor authentication (MFA) on administrative interfaces to reduce risk if unauthorized accounts are created. Implement detailed logging and alerting on user creation activities to detect suspicious behavior promptly. Engage with the vendor for timely updates or patches and test any new releases rigorously before deployment. Additionally, consider isolating the management system within a segmented network zone to limit potential lateral movement in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-03T09:37:36.247Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 683f4959182aa0cae2891646
Added to database: 6/3/2025, 7:13:29 PM
Last enriched: 7/11/2025, 6:04:07 AM
Last updated: 7/13/2025, 8:25:31 AM
Views: 9
Related Threats
CVE-2025-7534: SQL Injection in PHPGurukul Student Result Management System
MediumCVE-2025-7533: SQL Injection in code-projects Job Diary
MediumCVE-2025-7532: Stack-based Buffer Overflow in Tenda FH1202
HighCVE-2025-7531: Stack-based Buffer Overflow in Tenda FH1202
HighCVE-2025-7530: Stack-based Buffer Overflow in Tenda FH1202
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.