Skip to main content

CVE-2025-5522: Improper Authorization in jack0240 魏 bskms 蓝天幼儿园管理系统

Medium
VulnerabilityCVE-2025-5522cvecve-2025-5522
Published: Tue Jun 03 2025 (06/03/2025, 19:00:22 UTC)
Source: CVE Database V5
Vendor/Project: jack0240 魏
Product: bskms 蓝天幼儿园管理系统

Description

A vulnerability was found in jack0240 魏 bskms 蓝天幼儿园管理系统 up to dffe6640b5b54d8e29da6f060e0493fea74b3fad. It has been rated as critical. Affected by this issue is some unknown functionality of the file /sa/addUser of the component User Creation Handler. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.

AI-Powered Analysis

AILast updated: 07/11/2025, 06:04:07 UTC

Technical Analysis

CVE-2025-5522 is a critical improper authorization vulnerability identified in the jack0240 魏 bskms 蓝天幼儿园管理系统, a kindergarten management system. The flaw exists in the User Creation Handler component, specifically within the /sa/addUser endpoint. This vulnerability allows an unauthenticated remote attacker to manipulate the user creation process without proper authorization checks. The improper authorization means that the system fails to verify whether the requester has the necessary privileges to add new users, potentially allowing unauthorized account creation. Given that the product uses continuous delivery with rolling releases, specific version details for affected or patched releases are not clearly defined, complicating patch management. The CVSS 4.0 base score is 6.9 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and impacts on confidentiality, integrity, and availability at a low level. Although no known exploits are currently observed in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The vulnerability could lead to unauthorized access, privilege escalation, and potential lateral movement within affected environments, undermining the security posture of organizations using this system.

Potential Impact

For European organizations, especially those operating kindergartens or educational institutions using the bskms 蓝天幼儿园管理系统, this vulnerability poses a significant risk. Unauthorized user creation can lead to unauthorized access to sensitive personal data of children, staff, and parents, violating GDPR and other data protection regulations. Attackers could create accounts with elevated privileges, enabling data exfiltration, manipulation of records, or disruption of services. This could result in reputational damage, regulatory fines, and operational disruptions. Given the critical nature of educational data and the trust placed in these systems, exploitation could severely impact confidentiality and integrity. Additionally, unauthorized accounts could be used as footholds for further attacks within the organization's network. The medium CVSS score suggests moderate but tangible risk, emphasizing the need for prompt mitigation to prevent escalation.

Mitigation Recommendations

Organizations should immediately audit and monitor the /sa/addUser endpoint for unauthorized access attempts. Since no official patches or version details are available due to continuous delivery, it is critical to implement compensating controls such as network-level restrictions limiting access to the management interface to trusted IPs only. Employ Web Application Firewalls (WAFs) with rules to detect and block anomalous user creation requests. Conduct thorough access reviews and enforce multi-factor authentication (MFA) on administrative interfaces to reduce risk if unauthorized accounts are created. Implement detailed logging and alerting on user creation activities to detect suspicious behavior promptly. Engage with the vendor for timely updates or patches and test any new releases rigorously before deployment. Additionally, consider isolating the management system within a segmented network zone to limit potential lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-03T09:37:36.247Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 683f4959182aa0cae2891646

Added to database: 6/3/2025, 7:13:29 PM

Last enriched: 7/11/2025, 6:04:07 AM

Last updated: 7/13/2025, 8:25:31 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats