CVE-2025-65594

8.1 HIGH

📋 TL;DR

OpenSIS 9.2 and below contains an incorrect access control vulnerability in Student.php that allows authenticated low-privilege users to perform unauthorized database write operations on other users' data. This enables data manipulation and potential privilege escalation. All OpenSIS installations running vulnerable versions are affected.

💻 Affected Systems

Products:
  • OpenSIS
Versions: 9.2 and below
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access, but any low-privilege account can exploit this vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify or delete critical student records, alter grades, change enrollment statuses, or escalate privileges to administrative access, potentially compromising the entire student information system.

🟠

Likely Case

Malicious users or compromised accounts modifying student data they shouldn't have access to, leading to data integrity issues, grade manipulation, or unauthorized record changes.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to attempted unauthorized writes that are blocked and logged for investigation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation details are publicly available in the GitLab repository. The vulnerability requires authenticated access but is straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://opensis.com

Restart Required: No

Instructions:

Check the OpenSIS website for security updates. Upgrade to a version above 9.2 when available. Review and apply access control fixes to Student.php.

🔧 Temporary Workarounds

Implement Additional Access Control Checks

all

Add user permission validation before allowing database write operations in Student.php

# Manual code review and modification of Student.php to add proper authorization checks

Restrict Database Write Permissions

all

Limit database user permissions to only necessary operations

# Database-specific commands to revoke unnecessary write permissions

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate OpenSIS from other critical systems
  • Enable detailed logging of all database write operations and monitor for unauthorized access patterns

🔍 How to Verify

Check if Vulnerable:

Check OpenSIS version. If running 9.2 or below, review Student.php for missing access control checks on database write operations.

Check Version:

Check OpenSIS admin panel or configuration files for version information

Verify Fix Applied:

Test with low-privilege accounts attempting to modify other users' data. Verify proper authorization errors are returned.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authorization attempts on Student.php
  • Database write operations from low-privilege accounts affecting other users' data
  • Unusual patterns of data modification

Network Indicators:

  • HTTP POST requests to Student.php endpoints from unauthorized user accounts
  • Unusual database transaction volumes

SIEM Query:

source="opensis_logs" AND (uri="/Student.php" OR uri LIKE "%/Student.php%") AND (user_role="student" OR user_role="teacher") AND action="write" AND status="200"

🔗 References

📤 Share & Export