Seeyon Zhiyuan OA Web Application System versions up to and including 7.0 SP1 improperly decode and parse the `enc` parameter in thirdpartyController.do. The decoded map values can influence session attributes without sufficient authentication/authorization checks, enabling attackers to assign a session to arbitrary user IDs. VulnCheck has observed this vulnerability being exploited in the wild as of 2025-10-30 at 00:30:40.855917 UTC.

Project Subscriptions

Vendors Products
Zhiyuan Oa Web Application System Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 28 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 28 Nov 2025 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:seeyon:zhiyuan_oa_web_application_system:*:*:*:*:*:*:*:*

Fri, 31 Oct 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 31 Oct 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Seeyon
Seeyon zhiyuan Oa Web Application System
Vendors & Products Seeyon
Seeyon zhiyuan Oa Web Application System

Thu, 30 Oct 2025 21:30:00 +0000

Type Values Removed Values Added
Description Seeyon Zhiyuan OA Web Application System versions up to and including 7.0 SP1 improperly decode and parse the `enc` parameter in thirdpartyController.do. The decoded map values can influence session attributes without sufficient authentication/authorization checks, enabling attackers to assign a session to arbitrary user IDs. VulnCheck has observed this vulnerability being exploited in the wild as of 2025-10-30 at 00:30:40.855917 UTC.
Title Seeyon Zhiyuan OA Web Application System < 7.0 SP1 Authentication Bypass
Weaknesses CWE-306
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-11-28T19:17:19.543Z

Reserved: 2025-10-30T20:08:37.632Z

Link: CVE-2021-4461

cve-icon Vulnrichment

Updated: 2025-10-31T18:34:30.657Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-30T22:15:41.633

Modified: 2025-11-28T20:15:49.067

Link: CVE-2021-4461

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-31T10:14:04Z

Weaknesses