Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61148: n/a

0
Unknown
VulnerabilityCVE-2025-61148cvecve-2025-61148
Published: Thu Dec 04 2025 (12/04/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An Insecure Direct Object Reference (IDOR) vulnerability in the EduplusCampus 3.0.1 Student Payment API allows authenticated users to access other students personal and financial records by modifying the 'rec_no' parameter in the /student/get-receipt endpoint.

AI-Powered Analysis

AILast updated: 12/04/2025, 16:13:51 UTC

Technical Analysis

CVE-2025-61148 identifies an Insecure Direct Object Reference (IDOR) vulnerability in the EduplusCampus 3.0.1 Student Payment API, specifically within the /student/get-receipt endpoint. The vulnerability arises because the API fails to properly verify that the authenticated user is authorized to access the receipt identified by the 'rec_no' parameter. By manipulating this parameter, an authenticated user can retrieve other students' personal and financial information, including payment details and potentially sensitive identifiers. This flaw indicates a lack of proper authorization checks on object references, a common security weakness that can lead to data breaches. The vulnerability requires the attacker to be authenticated, which limits exposure to users with some level of access to the system, such as students or staff. However, no user interaction beyond crafting the request is necessary, making automated exploitation feasible. No CVSS score has been assigned yet, and no patches or known exploits are currently available. The vulnerability was reserved in September 2025 and published in December 2025. Given the nature of the data exposed, this vulnerability threatens confidentiality and privacy, potentially violating data protection regulations such as GDPR if exploited in European contexts. The absence of patches necessitates immediate attention from organizations using this software to implement compensating controls.

Potential Impact

The primary impact of CVE-2025-61148 is the unauthorized disclosure of sensitive student personal and financial data, which can lead to privacy violations, identity theft, and financial fraud. For European organizations, this breach could result in significant regulatory penalties under GDPR due to inadequate protection of personal data. The exposure of financial records may also undermine trust in educational institutions and lead to reputational damage. Since the vulnerability requires authentication, the attack surface is limited to users with legitimate access, but insider threats or compromised accounts could exploit this flaw. The lack of proper authorization checks can also facilitate lateral movement within the system, potentially exposing additional sensitive information. The impact on availability and integrity is minimal, but the confidentiality breach alone is severe. Educational institutions across Europe that rely on EduplusCampus 3.0.1 for student payment processing are particularly at risk, especially those with large student populations and extensive financial transactions.

Mitigation Recommendations

1. Implement strict server-side authorization checks to ensure that users can only access their own records by validating the ownership of the 'rec_no' parameter against the authenticated user's identity. 2. Employ parameter validation and access control mechanisms to prevent unauthorized enumeration or manipulation of object references. 3. Conduct thorough code reviews and security testing focused on IDOR vulnerabilities across all API endpoints. 4. Monitor API logs for unusual access patterns, such as repeated requests with varying 'rec_no' values from the same user, which may indicate exploitation attempts. 5. Apply network segmentation and role-based access controls to limit the scope of users who can authenticate to the Student Payment API. 6. Engage with the vendor or development team to prioritize the release of a security patch or update addressing this vulnerability. 7. Educate users about the importance of safeguarding their credentials to reduce the risk of account compromise. 8. Consider implementing multi-factor authentication (MFA) to strengthen authentication security. 9. If immediate patching is not possible, deploy web application firewalls (WAFs) with custom rules to detect and block suspicious parameter tampering attempts targeting the 'rec_no' parameter.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6931afbe739651d5d527e7c2

Added to database: 12/4/2025, 3:58:54 PM

Last enriched: 12/4/2025, 4:13:51 PM

Last updated: 12/5/2025, 3:22:47 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats