Home

Description

Seeyon Zhiyuan OA Web Application System versions up to and including 7.0 SP1 improperly decode and parse the `enc` parameter in thirdpartyController.do. The decoded map values can influence session attributes without sufficient authentication/authorization checks, enabling attackers to assign a session to arbitrary user IDs. VulnCheck has observed this vulnerability being exploited in the wild as of 2025-10-30 at 00:30:40.855917 UTC.

PUBLISHED Reserved 2025-10-30 | Published 2025-10-30 | Updated 2025-10-31 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-306 Missing Authentication for Critical Function

Product status

Default status
unknown

Any version
affected

Credits

Anonymous User via WeChat finder

References

github.com/...4853f3bfdf0a384/pocs/seeyon-oa-cookie-leak.yml exploit

mp.weixin.qq.com/s/0AqdfTrZUVrwTMbKEKresg exploit

github.com/...4853f3bfdf0a384/pocs/seeyon-oa-cookie-leak.yml exploit

github.com/...fa8c0/http/misconfiguration/seeyon-unauth.yaml exploit

www.vulncheck.com/...pplication-system-authentication-bypass third-party-advisory

cve.org (CVE-2021-4461)

nvd.nist.gov (CVE-2021-4461)

Download JSON