CVE-2025-46203
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-04

Last updated on: 2025-06-10

Assigner: MITRE

Description
An issue in Unifiedtransform v2.0 allows a remote attacker to escalate privileges via the /students/edit/{id} endpoint.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-04
Last Modified
2025-06-10
Generated
2026-05-07
AI Q&A
2025-06-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
changeweb unifiedtransform 2.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-266 A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-46203 is an Incorrect Access Control vulnerability in Unifiedtransform v2.0, a school management software. It occurs at the /students/edit/{id} endpoint, which is supposed to be accessible only by administrators. However, due to improper access control, unauthorized users such as teachers and students can access this endpoint and modify student records. This allows them to escalate their privileges and make unauthorized changes to data. [1]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing unauthorized users to escalate their privileges and modify student data without permission. This compromises data integrity and security, potentially leading to unauthorized data manipulation, loss of trust, and misuse of sensitive information within the school management system. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to access the /students/edit/{id} endpoint with a non-administrator user account (such as a teacher or student) and checking if unauthorized modifications to student records are possible. For example, after logging in as a teacher or student, use a command-line tool like curl to send a GET or POST request to /students/edit/{id} with various IDs to see if access is improperly granted. Example command: curl -X GET -b cookies.txt https://<target>/students/edit/4 (where cookies.txt contains session cookies for a non-admin user). If the response allows editing or updating student data, the vulnerability is present. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the /students/edit/{id} endpoint to only administrator roles by fixing the access control checks in the UserController's editStudents() method. Until a patch is applied, monitor and limit user permissions to prevent teachers and students from accessing this endpoint. Additionally, consider implementing network-level controls such as web application firewalls (WAF) rules to block unauthorized requests to this endpoint from non-admin users. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart