CVE-2025-27583

9.1 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to create and modify user accounts, including Administrator accounts, in Serosoft Academia SIS EagleR. It affects all organizations using the vulnerable version of this student information system. The incorrect access control in the REST API endpoint enables complete account takeover.

💻 Affected Systems

Products:
  • Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR
Versions: v1.0.118
Operating Systems: Any OS running the application
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration of the specified version. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers create admin accounts, modify existing users, exfiltrate sensitive student data, and deploy ransomware or other malware.

🟠

Likely Case

Attackers create backdoor admin accounts to maintain persistent access, modify user permissions, and potentially access sensitive student and financial information.

🟢

If Mitigated

With proper network segmentation and API gateway controls, impact limited to isolated application layer with no lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The GitHub reference shows detailed research and likely includes exploit code. The simple REST endpoint with no authentication makes exploitation trivial.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Contact Serosoft Solutions for patch information. Check their official website and support channels for security updates.

🔧 Temporary Workarounds

Block Vulnerable Endpoint

all

Use web application firewall or reverse proxy to block access to /rest/staffResource/findAllUsersAcrossOrg

# Example nginx location block:
location /rest/staffResource/findAllUsersAcrossOrg { deny all; }
# Example Apache .htaccess:
<Location "/rest/staffResource/findAllUsersAcrossOrg">
Order deny,allow
Deny from all
</Location>

Implement API Authentication

all

Add authentication middleware to all REST endpoints

# Application-specific implementation required

🧯 If You Can't Patch

  • Isolate the SIS application in a separate network segment with strict firewall rules
  • Implement comprehensive logging and monitoring for all user creation/modification activities

🔍 How to Verify

Check if Vulnerable:

Attempt to access https://[target]/rest/staffResource/findAllUsersAcrossOrg without authentication. If it returns user data or allows operations, the system is vulnerable.

Check Version:

Check application version in admin panel or via /version endpoint if available

Verify Fix Applied:

Test the endpoint with unauthenticated requests - should return 403/401 error or no user data. Verify proper authentication is required for all user management operations.

📡 Detection & Monitoring

Log Indicators:

  • Unusual user creation events
  • Multiple failed authentication attempts followed by successful user creation
  • Admin account creation from unusual IP addresses

Network Indicators:

  • HTTP POST requests to /rest/staffResource/findAllUsersAcrossOrg without authentication headers
  • Unusual traffic patterns to user management endpoints

SIEM Query:

source="web_server" AND (uri="/rest/staffResource/findAllUsersAcrossOrg" OR event="user_created") AND NOT user_agent="monitoring_tool"

🔗 References

📤 Share & Export