CVE-2025-25950

8.1 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass access controls in Serosoft Academia SIS EagleR v1.0.118, enabling them to create and modify user accounts including Administrator accounts. This affects all systems running the vulnerable version of this student information system software.

💻 Affected Systems

Products:
  • Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR
Versions: v1.0.118
Operating Systems: Any OS running the application
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is in the /rest/staffResource/update endpoint and affects the default installation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers create administrator accounts, gain full control over the SIS, and potentially access sensitive student data, modify grades, or disrupt operations.

🟠

Likely Case

Attackers create backdoor administrator accounts to maintain persistent access, potentially leading to data theft, unauthorized modifications, or further system exploitation.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication, and monitoring preventing successful exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the vulnerable endpoint but appears straightforward based on available research.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

Contact Serosoft Solutions for patch information. Check their official website or support channels for security updates.

🔧 Temporary Workarounds

Block Vulnerable Endpoint

all

Restrict access to the /rest/staffResource/update endpoint using web application firewall or network controls

Network Segmentation

all

Isolate the SIS system from untrusted networks and implement strict access controls

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the SIS application
  • Enable detailed logging and monitoring for account creation/modification activities

🔍 How to Verify

Check if Vulnerable:

Check if your system is running Serosoft Academia SIS EagleR v1.0.118 and test if unauthorized account creation/modification is possible via the /rest/staffResource/update endpoint

Check Version:

Check application version in admin panel or configuration files

Verify Fix Applied:

Verify that unauthorized users cannot create or modify accounts, especially administrator accounts, through the vulnerable endpoint

📡 Detection & Monitoring

Log Indicators:

  • Unusual account creation events
  • Multiple failed authentication attempts followed by successful account modifications
  • Administrator account creation from unusual IP addresses

Network Indicators:

  • HTTP POST requests to /rest/staffResource/update from unauthorized sources
  • Unusual traffic patterns to the SIS application

SIEM Query:

source="sis_logs" AND (event="account_creation" OR event="account_modification") AND user_role="administrator"

🔗 References

📤 Share & Export