A vulnerability was detected in zhuimengshaonian wisdom-education up to 1.0.4. The affected element is an unknown function of the file src/main/java/com/education/api/controller/student/WrongBookController.java. Performing manipulation of the argument subjectId results in authorization bypass. The attack can be initiated remotely. The exploit is now public and may be used.
Metrics
Affected Vendors & Products
References
History
Mon, 06 Oct 2025 05:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was detected in zhuimengshaonian wisdom-education up to 1.0.4. The affected element is an unknown function of the file src/main/java/com/education/api/controller/student/WrongBookController.java. Performing manipulation of the argument subjectId results in authorization bypass. The attack can be initiated remotely. The exploit is now public and may be used. | |
Title | zhuimengshaonian wisdom-education WrongBookController.java authorization | |
Weaknesses | CWE-285 CWE-639 |
|
References |
|
|
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-10-06T05:02:06.331Z
Reserved: 2025-10-05T06:35:57.938Z
Link: CVE-2025-11321

No data.

Status : Received
Published: 2025-10-06T05:15:34.510
Modified: 2025-10-06T05:15:34.510
Link: CVE-2025-11321

No data.

No data.