Seeyon Zhiyuan OA Web Application System versions up to and including 7.0 SP1 improperly decode and parse the `enc` parameter in thirdpartyController.do. The decoded map values can influence session attributes without sufficient authentication/authorization checks, enabling attackers to assign a session to arbitrary user IDs. VulnCheck has observed this vulnerability being exploited in the wild as of 2025-10-30 at 00:30:40.855917 UTC.
History

Fri, 31 Oct 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 31 Oct 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Seeyon
Seeyon zhiyuan Oa Web Application System
Vendors & Products Seeyon
Seeyon zhiyuan Oa Web Application System

Thu, 30 Oct 2025 21:30:00 +0000

Type Values Removed Values Added
Description Seeyon Zhiyuan OA Web Application System versions up to and including 7.0 SP1 improperly decode and parse the `enc` parameter in thirdpartyController.do. The decoded map values can influence session attributes without sufficient authentication/authorization checks, enabling attackers to assign a session to arbitrary user IDs. VulnCheck has observed this vulnerability being exploited in the wild as of 2025-10-30 at 00:30:40.855917 UTC.
Title Seeyon Zhiyuan OA Web Application System < 7.0 SP1 Authentication Bypass
Weaknesses CWE-306
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-10-30T21:16:23.161Z

Updated: 2025-10-31T18:35:21.327Z

Reserved: 2025-10-30T20:08:37.632Z

Link: CVE-2021-4461

cve-icon Vulnrichment

Updated: 2025-10-31T18:34:30.657Z

cve-icon NVD

Status : Received

Published: 2025-10-30T22:15:41.633

Modified: 2025-10-31T19:15:48.247

Link: CVE-2021-4461

cve-icon Redhat

No data.