Home

Description

An unauthenticated attacker with access to TCP port 12306 of the WorkExaminer server can exploit missing server-side authentication checks to bypass the login prompt in the WorkExaminer Professional console to gain administrative access to the WorkExaminer server and therefore all sensitive monitoring data. This includes monitored screenshots and keystrokes of all users. The WorkExaminer Professional console is used for administrative access to the server. Before access to the console is granted administrators must login. Internally, a custom protocol is used to call a respective stored procedure on the MSSQL database. The return value of the call is not validated on the server-side. Instead it is only validated client-side which allows to bypass authentication.

PUBLISHED Reserved 2025-09-17 | Published 2025-10-21 | Updated 2025-10-22 | Assigner SEC-VLab

Problem types

CWE-602 Client-Side Enforcement of Server-Side Security

Product status

Default status
unknown

<= 4.0.0.52001
affected

Credits

Tobias Niemann, SEC Consult Vulnerability Lab finder

Daniel Hirschberger, SEC Consult Vulnerability Lab finder

Thorger Jansen, SEC Consult Vulnerability Lab finder

Marius Renner, SEC Consult Vulnerability Lab finder

References

r.sec-consult.com/workexaminer third-party-advisory

cve.org (CVE-2025-10640)

nvd.nist.gov (CVE-2025-10640)

Download JSON