CVE-2025-10084

4.3 MEDIUM

📋 TL;DR

This vulnerability allows unauthorized access to error log details in elunez eladmin systems. Attackers can remotely exploit improper authorization in the SysLogController component to view sensitive error information. Organizations using eladmin up to version 2.7 are affected.

💻 Affected Systems

Products:
  • elunez eladmin
Versions: Up to and including 2.7
Operating Systems: Any OS running eladmin
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain unauthorized access to detailed error logs containing sensitive system information, potentially enabling further attacks or data exposure.

🟠

Likely Case

Unauthorized users access error log details that may contain debugging information, system paths, or partial data structures.

🟢

If Mitigated

With proper authorization controls, only authenticated administrators can access error log details, limiting exposure.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit is publicly available and requires some authentication but bypasses authorization checks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 2.7

Vendor Advisory: https://www.cnblogs.com/aibot/p/19063331

Restart Required: No

Instructions:

1. Upgrade eladmin to version after 2.7. 2. Verify authorization controls are properly implemented for SysLogController endpoints.

🔧 Temporary Workarounds

Restrict access to /api/logs/ endpoints

all

Implement network-level restrictions or web application firewall rules to limit access to log endpoints.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate eladmin systems from untrusted networks.
  • Add additional authentication and authorization middleware to validate all requests to SysLogController endpoints.

🔍 How to Verify

Check if Vulnerable:

Check eladmin version number in application configuration or admin interface. If version is 2.7 or earlier, system is vulnerable.

Check Version:

Check application.properties or admin dashboard for version information.

Verify Fix Applied:

After upgrade, attempt to access /api/logs/error/1 endpoint with unauthorized credentials - should return proper authorization error.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /api/logs/error/1 endpoint
  • Multiple failed authorization attempts followed by successful log access

Network Indicators:

  • Unusual patterns of requests to log endpoints from unauthorized IPs

SIEM Query:

source="eladmin" AND (uri="/api/logs/error/1" OR uri="/api/logs/error/*") AND response_code=200 AND user_role!="admin"

🔗 References

📤 Share & Export