CVE-2025-46203
BaseFortify
Publication date: 2025-06-04
Last updated on: 2025-06-10
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| changeweb | unifiedtransform | 2.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-266 | A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-46203 is an Incorrect Access Control vulnerability in Unifiedtransform v2.0, a school management software. It occurs at the /students/edit/{id} endpoint, which is supposed to be accessible only by administrators. However, due to improper access control, unauthorized users such as teachers and students can access this endpoint and modify student records. This allows them to escalate their privileges and make unauthorized changes to data. [1]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing unauthorized users to escalate their privileges and modify student data without permission. This compromises data integrity and security, potentially leading to unauthorized data manipulation, loss of trust, and misuse of sensitive information within the school management system. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to access the /students/edit/{id} endpoint with a non-administrator user account (such as a teacher or student) and checking if unauthorized modifications to student records are possible. For example, after logging in as a teacher or student, use a command-line tool like curl to send a GET or POST request to /students/edit/{id} with various IDs to see if access is improperly granted. Example command: curl -X GET -b cookies.txt https://<target>/students/edit/4 (where cookies.txt contains session cookies for a non-admin user). If the response allows editing or updating student data, the vulnerability is present. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the /students/edit/{id} endpoint to only administrator roles by fixing the access control checks in the UserController's editStudents() method. Until a patch is applied, monitor and limit user permissions to prevent teachers and students from accessing this endpoint. Additionally, consider implementing network-level controls such as web application firewalls (WAF) rules to block unauthorized requests to this endpoint from non-admin users. [1]